FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 7th Sem 2018-2019 NIT 701 Cryptography And Network Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 7th Semester (Seventh Semester) 2018-2019 NIT 701 Cryptography And Network Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Firstranker's choice

www.FirstRanker.com

Paper Id: 113711

--- Content provided by​ FirstRanker.com ---

Roll No.

B. TECH

(SEM VII) THEORY EXAMINATION 2018-19

CRYPTOGRAPHY AND NETWORK SECURITY

Time: 3 Hours

--- Content provided by​ FirstRanker.com ---

Total Marks: 100

Note: 1. Attempt all Sections. If require any missing data; then choose suitably.

SECTION A

Attempt all questions in brief. 2 x 10 = 20

  1. Define block cipher
  2. What do you mean by cryptography?
  3. --- Content provided by​ FirstRanker.com ---

  4. Define hash algorithm.
  5. What is stream cipher?
  6. Differentiate between public key and private key.
  7. Explain intrusion detection in brief.
  8. What do you mean by mail security?
  9. --- Content provided by⁠ FirstRanker.com ---

  10. What is DSS in cryptography?
  11. What do you mean by email security?
  12. Describe birthday attack.

SECTION B

Attempt any three of the following: 10 x 3 = 30

  1. a. Draw the block diagram of DES algorithm. Also explain its functionality.

    --- Content provided by​ FirstRanker.com ---

  2. b. What is prime and relative prime numbers in cryptography and network security

  3. c. Discuss the Message Authentication Codes. Also give the use of Authentication requirements in MAC.

  4. --- Content provided by FirstRanker.com ---

  5. d. What is Diffie-Hellman Key Exchange in key management?

SECTION C

Attempt any one part of the following: 10 x 1 = 10

  1. (a) List the Strength of DES in brief. Also explain the Triple DES.

    (b) What is the Shannon's theory of confusion and diffusion in terms of information security?

    --- Content provided by⁠ FirstRanker.com ---

Attempt any one part of the following: 10 x 1 = 10

  1. (a) States the Advanced Encryption Standard (AES). Also provide the functioning of AES.

    (b) Explain the Chinese Remainder theorem with example. How Chinese Remainder theorem provide the security to online information sharing transactions.

  2. --- Content provided by FirstRanker.com ---

Attempt any one part of the following: 10 x 1 = 10

  1. (a) What do you understand from hash functions? Discuss the working of Secure hash algorithm (SHA) in Message Authentication

    (b) Explain the Digital Signatures. Also give a detail description of Elgamal Digital Signature Techniques.

Attempt any one part of the following: 10 x 1 = 10

--- Content provided by FirstRanker.com ---

  1. (a) Discuss X.509 Certificates in detail. What is the role X.509 Certificates in cryptography?

    (b) What is Electronic mail security? Provide the application of pretty good privacy (PGP) in transaction Authentication

Attempt any one part of the following: 10 x 1 = 10

  1. (a) Explain Secure electronic transaction (SET) in internet protocol security in detail.

    --- Content provided by‍ FirstRanker.com ---

    (b) What do mean by system security? Also discuss Viruses and related threats to system security.

www.FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University