You are on page 1of 3
2A3 No of Pages : 3 Course Code: 081060 Roll No: (To be filled in by the candidate), PSG COLLEGE OF TECHNOLOGY, COIMBATORE -641 004 SEMESTER EXAMINATIONS, FEBRUARY / MARCH - 2013 BE— ELECTRONICS AND COMMUNICATION ENGINEERING — Semester: 7 O8L060 NETWORK SECURITY Time : 3 Hours Maximum Marks: 100 INSTRUCTIONS SePe Group I and Group IT questions should be answered in the Main Answer Book Answet any FEVE questidns in Group IL Answer ALL questions ih Group Land Group Group III - Multiple Choice questions - (which will be given to the candidates half ait | hour before the scheduled close of the examination) should be answered only in the space provided in the Main Answer Book, 10. GROUPT Marks; 10x 3=30 List the software program controls \Wite about repudiation and Non-repuidiation security service. What is staganography? Alice teets bob and says UGXTQUYF A. I She uses vernam cipher , What dees she Want to convey ?[use key as NCB TZQARX -one -time pad) State Euler's Totient function Compare conventional and public key enryption Define digital signature, What types of attacks are addressed by message authentication? Giva examples of applications of IPSec Compare worm and virus Page No: | 243 No of Pages : 3 Course Code: 081.050 GROUP IL Marks: 5 x 12 = 60 11. With suitable examples, discuss the taxonomy of attacks witfr relation to seatirity goals. 12..@) Discuss the idea of algorithm médes for block and Stream cipher: 6 b) With,neat sketch explain the data encryption standard algorithm. (6) 13, a)-Discuss about~.the Diffie-Hellman key exchange algorithm..with suitable examples, 6) b) Expidin how the Kay” management addressing the. problem of public key distribution (8) 14. Explain main features of SHA-I logic, Compression Function and mention. its application. What are the merits of SHA-| algorithm, compare with MDS algorithm, 15, Explain the digital signature standard in following methods (i)The DSS’Approach (i) The Digital Signature Algorithm: 16. What protocols comprise SSL? In SSL ‘and TLS, why. is there a separate Change Cipher Spec Protocol, rather than! including a Change Cipher Spec\message in the. Handshake Protocol JENDI FD/RL, Page No: 2 243 No of Pages : Course Cade: 081060 | Roll No: Wite the Alphabet of your choice answer foreach question in the space provided in the Main Answer Book (Bo nat attach this question paper along with the Main Answer Book) FEBRUARY / MARCH - 2013 @8L060 NETWORK SECURITY GROUP II Marks: 10x 1 =10 DAS." __ is awoaknéss in the seourity systems A) Vulnerability» B) Confidentiality —€) Integrity D) Authenticity ly In an | an asget of the system becomes lost or unusable. A) Interception —_B) Interruption ©) Modification « D) Fabrication II) _ Caesar Cipheris a _ technique ‘A) Transposition B) Steganography C) Substitution D) Watermarking lv) In , the statistieal structure of the plaintext is dissipated into long range. statistics of the cipher text A) Play tair cipher B) Hill cipher ©) Confusion —_D) Diffusion Vi The algorithm is a'simple procedure far determining the greatest common divisor of two positive integers AjEuclic!s B) Polynomial “C) Multiplicative Inverse D) Finite-fields Vi) The value of B(10) is Ay 9 B) 4, ot DB) 22 Vil) ToWetify a digital signature, we need the __ A) Sender's private key B) Receiver's private key C) Receivers public key D) Sender's public key Vill) RIPEMD-160 uses a _J. convention A) Little-endian _ B) Big: endian ©) Binary D) Decimal bey __is'dn'6pen encryption-and security speaitication designed to pratect credit card transactions on the internet A) PET B) SET cy OIMD D) POMD Xo Provides protection to the entire IP Packet. A) Tunnel mods B) Transporimode —C) IKE DESP Page No:3

You might also like