Firstranker's choice
Paper Id: 113711
--- Content provided by FirstRanker.com ---
Roll No.
B. TECH
(SEM VII) THEORY EXAMINATION 2018-19
CRYPTOGRAPHY AND NETWORK SECURITY
Time: 3 Hours
--- Content provided by FirstRanker.com ---
Total Marks: 100
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
Attempt all questions in brief. 2 x 10 = 20
- Define block cipher
- What do you mean by cryptography?
- Define hash algorithm.
- What is stream cipher?
- Differentiate between public key and private key.
- Explain intrusion detection in brief.
- What do you mean by mail security?
- What is DSS in cryptography?
- What do you mean by email security?
- Describe birthday attack.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION B
Attempt any three of the following: 10 x 3 = 30
-
a. Draw the block diagram of DES algorithm. Also explain its functionality.
--- Content provided by FirstRanker.com ---
-
b. What is prime and relative prime numbers in cryptography and network security
-
c. Discuss the Message Authentication Codes. Also give the use of Authentication requirements in MAC.
-
d. What is Diffie-Hellman Key Exchange in key management?
--- Content provided by FirstRanker.com ---
SECTION C
Attempt any one part of the following: 10 x 1 = 10
-
(a) List the Strength of DES in brief. Also explain the Triple DES.
(b) What is the Shannon's theory of confusion and diffusion in terms of information security?
--- Content provided by FirstRanker.com ---
Attempt any one part of the following: 10 x 1 = 10
-
(a) States the Advanced Encryption Standard (AES). Also provide the functioning of AES.
(b) Explain the Chinese Remainder theorem with example. How Chinese Remainder theorem provide the security to online information sharing transactions.
--- Content provided by FirstRanker.com ---
Attempt any one part of the following: 10 x 1 = 10
-
(a) What do you understand from hash functions? Discuss the working of Secure hash algorithm (SHA) in Message Authentication
(b) Explain the Digital Signatures. Also give a detail description of Elgamal Digital Signature Techniques.
Attempt any one part of the following: 10 x 1 = 10
--- Content provided by FirstRanker.com ---
-
(a) Discuss X.509 Certificates in detail. What is the role X.509 Certificates in cryptography?
(b) What is Electronic mail security? Provide the application of pretty good privacy (PGP) in transaction Authentication
Attempt any one part of the following: 10 x 1 = 10
-
(a) Explain Secure electronic transaction (SET) in internet protocol security in detail.
--- Content provided by FirstRanker.com ---
(b) What do mean by system security? Also discuss Viruses and related threats to system security.
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University