## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Set No. 1

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) What are two general approaches to attacking a cipher? [8M]

(b) What is the diﬀerence between an unconditionally secure cipher and a computationally secure cipher? [8M] 2. Explain the process of encryption and decryption in IDEA algorithm. 3. (a) Explain RSA Algorithm ? i. p= 3, q=11,d=7, M=5 ii. p=11,q=13,e=11,M=7 4. (a) Explain in detail about Extended Euclid’s Algorithm. (b) Determine Multiplicative inverse of 550 in GF(1759). [8+8] [16M] [8M]

(b) Perform encryption and decryption using RSA algorithm for the following [4M+4M]

5. (a) Is it necessary to recover the secret key in order to attack a MAC algorithm? (b) What characteristics are needed in a secure hash function? 6. (a) What problem was Kerberos designed to address? (b) What are three threats associated with user authentication over a network or Internet? (c) List three approaches to secure user authentication over a network or Internet? [4+4+8] 7. (a) What services are provided by the SSL Record Protocol? (b) What steps are involved in the SSL Record Protocol transmission? 8. (a) What is a digital immune system? (b) Explain antivirus approaches ⋆⋆⋆⋆⋆ [8+8] [6+10] [8+8]

1 of 1

Code No: RR410504

Set No. 2

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. This problem provides a numerical example of encryption using a one-round version of DES. We start with the same bit pattern for the key and plain text, namely, In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 (a) Derive K1 , the ﬁrst - round subkey. (b) Derive L0 , R0 (c) Expand R0 to get E[R0 ] (d) Calculate A=E[R0 ] ⊕ K1 . (e) Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding S-box substitutions. (f) Cancatenate the results of (e) to get a 32-bit result,B. (g) Apply the permutation to get P(B). (h) Calculate R1=P(B) ⊕ L0 (i) write down the cipher text. 2. (a) List the characteristics of advanced block ciphers. (b) What are the diﬀerences between RC5 and RC2? 3. (a) Illustrate Diﬃe-hellman Key Exchange scheme for GF(P) [16M] [8M] [8M] [6M]

(b) Consider a diﬃe-helman scheme with a common prime q=11 and a primitive rootα=2 i. If user A has public key YA = 9, what is A’s private key XA ? ii. If user B has public key YB = 3, what is the shared key K? 4. (a) State and prove Fermat’s theorem? (b) State and prove Euler’s theorem? (c) Using Fermat’s theorem, ﬁnd 3201 mod 11. 5. (a) List requirements for a Hash Function. (b) What basic arithmetical and logical functions are used in SHA-1? 6. Explain X.509 Authentication services 1 of 2 [6+10] [16] [5M+5M+6M] [10M]

Code No: RR410504 7. Write a short note on (a) Electronic mail Services (b) Firewalls 8. Write notes on (a) Viruses (b) Worms (c) Bacteria ⋆⋆⋆⋆⋆

Set No. 2

[8+8]

[6+6+4]

2 of 2

Code No: RR410504

Set No. 3

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) What are the various components of symmetric cipher model? Explain. [8M] (b) Write short notes on crypto analysis. 2. (a) List the characteristics of advanced block ciphers. (b) What are the diﬀerences between RC5 and RC2? 3. (a) Explain RSA Algorithm? [8M] [8M] [8M] [8M]

(b) In a RSA system, the public key of a given user is e=31,n=3599.What is the private key of this user? [8M] 4. (a) State and prove Fermat’s theorem? (b) State and prove Euler’s theorem? (c) Using Fermat’s theorem, ﬁnd 3201 mod 11. [5M+5M+6M]

5. (a) What is the diﬀerence between weak and strong collision resistance? (b) What is the role of a compression function in a hash function? 6. (a) Discuss cryptographic algorithms used in S/MIME (b) List limitations of SMTP/822 scheme? 7. Write note on Encapsulating security payload. 8. Write notes on (a) Fire walls (b) Trusted systems ⋆⋆⋆⋆⋆ [8+8] [8+8] [16] [6+10]

1 of 1

Code No: RR410504

Set No. 4

IV B.Tech I Semester Supplementary Examinations, February 2007 NETWORK SECURITY AND CRYPTOGRAPHY (Computer Science & Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) What are the various components of symmetric cipher model? Explain. [8M] (b) Write short notes on crypto analysis. [8M]

2. Demonstrate that Blow Fish decryption is inverse of Blowﬁsh encryption. [16M] 3. (a) Explain public key Crypto Systems. (b) Explain in detail about Euclid’s Algorithm. (c) Give a brief account on Random number Generation. 4. (a) If p and q are two prime numbers ,with p= q and n=pq Prove that Φ(n)= Φ(pq)=(p-1)(q-1). (b) Determine Φ(37) and Φ(35). 5. (a) what are the requirements for a hash function? (b) List and discuss the basic uses of hash function. 6. (a) What is R64 conversion? (b) Why is R64 conversion useful for an e-mail application? (c) Why is the segmentation and reassembly function in PGP needed? [4+6+6] 7. Write note on Encapsulating security payload. 8. Write notes on (a) Fire walls (b) Trojan Horse Defense ⋆⋆⋆⋆⋆ [8+8] [16] [8+8] [10+6] [6M] [5M] [5M]

1 of 1

- crypto finaale.pptuploaded byChandni Bathla
- RSA Algorithm and ClassParticipationuploaded byaarthisub
- Privacy Protection of Big Data using Ring Signatureuploaded byIRJET Journal
- 123456uploaded byKalaivani Marappan
- Module7.4.pptxuploaded byHarpreet Singh
- prjct(1)uploaded bypriya__ahuja
- l_09pkcuploaded byNikhil Yadav
- A Novel Technique for Secure Data Transmission Using Cryptography and Steganography (2)uploaded byInternational Journal of Innovative Science and Research Technology
- Cyber Lawuploaded byMuzammil Deshmukh
- Review Questionsuploaded byTaciturn Frnd
- rsa algorithmuploaded bygloveable
- rsauploaded byappyix
- 10916136 Malware Resilient Strong Authentication and Crypto Software as Service is Releaseduploaded byeligahu
- Rsauploaded byAnshu Mittal
- All Unit 2 Mark and 16 mark.pdfuploaded bySubash Prabhu
- Assignmentuploaded byNguyen Bao
- Scimakelatex.1174.John+Mcartney.nain+Steley.george+Stasgh.georgia+Lambda.paul+Smithuploaded byencasquetado
- Network Securityuploaded bymukeshnt
- 32 1490083582_21-03-2017.pdfuploaded byEditor IJRITCC
- Efficient Coercion Resistant Public Key Encryptionuploaded byAI Coordinator - CSC Journals
- Unit 2 CRYPTOGRAPHYuploaded bydev chauhan
- What is Cryptographyuploaded byfxtrend
- Security in Computing - Lecture Notes, Study Material and Important Questions, Answersuploaded byM.V. TV
- 10.1.1.31.8086buploaded bynvbond
- Design and Analysis of a Novel Digital Image Encryption Schemeuploaded byAIRCC - IJNSA
- PCI for Dummiesuploaded byArnold D'Silva
- analysisuploaded byapi-235904143
- Scheme of Study for 7 & 8 Semuploaded byNaveen Kumar Bt
- Secured Image Transmission using Mosaic Imagesuploaded byIJSTE
- Encryption Lessonuploaded byKelly Lougheed

- r05320305 Design of Machine Members IIuploaded bySrinivasa Rao G
- r05320205 Switchgear and Protectionuploaded bySrinivasa Rao G
- 41 Mca Nr Software Engineeringuploaded bySrinivasa Rao G
- r5 401 Mba Strategic Management Set1uploaded bySrinivasa Rao G
- r5 402 Mba Management of Technology Set1uploaded bySrinivasa Rao G
- 43-Mca-Or-Design and Analysis of Algorithmuploaded bySrinivasa Rao G
- r5 401 Mba Strategic Management Set1uploaded bySrinivasa Rao G
- Rr322305 Immunologyuploaded bySrinivasa Rao G
- 41 Mca Nr Software Engineeringuploaded bySrinivasa Rao G
- r05320403 Microwave Engineeringuploaded bySrinivasa Rao G
- r6 42 Mca Advanced Java Programming Set1uploaded bySrinivasa Rao G
- 43-Mca-Or-Design and Analysis of Algorithmuploaded bySrinivasa Rao G
- 42 Mca Nr Programming in Javauploaded bySrinivasa Rao G
- r6 43 Mca Data Warehousing and Mining Set1uploaded bySrinivasa Rao G
- 41 Mca or Software Engineeringuploaded bySrinivasa Rao G
- r5 410 Mba Management of Change Set1uploaded bySrinivasa Rao G
- Nr 31 Mca Database Management Systemsuploaded bySrinivasa Rao G
- Nr 302 Mba Cost and Management Accounting Set1uploaded bySrinivasa Rao G
- Or 34 Mca Management Information Systemsuploaded bySrinivasa Rao G
- r5 408 Mba Decision Support Systems Set1uploaded bySrinivasa Rao G
- Nr 305 Mba Retailing Management Set1uploaded bySrinivasa Rao G
- r6 43 Mca Data Warehousing and Mining Set1uploaded bySrinivasa Rao G
- r6 34 Mca Management Information Systems Set1uploaded bySrinivasa Rao G
- r6 48 Mca Mobile Computing Set1uploaded bySrinivasa Rao G
- r6 33 Mca Unix Networks Programming Set1uploaded bySrinivasa Rao G
- r5 305 Mba Retailing Management Set1uploaded bySrinivasa Rao G
- r5 304 Mba Enterprise Resource Planninguploaded bySrinivasa Rao G
- Or 32 Mcacomputer Communication Networksuploaded bySrinivasa Rao G
- r6 47 Mca Distributed Operating Systems Set1uploaded bySrinivasa Rao G
- Nr-35-Mca-Design and Analysis of Algorithmuploaded bySrinivasa Rao G

Close Dialog## Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

Loading