This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
Firstranker's choice
Code: 9D06106a
--- Content provided by FirstRanker.com ---
Time: 3 hours
M.Tech II Semester Supplementary Examinations February 2018
NETWORK SECURITY & CRYPTOGRAPHY
(Electronics & Communication Engineering)
--- Content provided by FirstRanker.com ---
(For students admitted in 2012, 2013, 2014, 2015 & 2016 only)
Answer any FIVE questions
All questions carry equal marks
Max. Marks: 60
- (a) Discuss a model for network security. Explain the broad categories of security mechanisms needed to cope with unwanted access.
--- Content provided by FirstRanker.com ---
(b) Explain about the following terms: (i) Security service. (ii) Steganography. - (a) Describe theory of block cipher design.
(b) Discuss about key generation, verification and updating.
(c) What is RC5? Explain four modes of operation in it. - (a) In a RSA system, the public key of a given user e = 31, n = 3599. What is the private key of this user?
--- Content provided by FirstRanker.com ---
(b) What are the roles of the public and private key?
(c) Illustrate Diffie-Hellman key exchange scheme for GF(P). - (a) Using Fermat's theorem, find 3201 mod 11.
(b) Explain in detail about extended Euclid's algorithm.
(c) What is the difference between message authentication code and one-way hash function? What are the possible attacks against this scheme? - (a) Explain about RIPEMD – 160 signature scheme.
(b) Discuss about: (i) Authentication protocols. (ii) Digital signature standards. - (a) What is Kerberos? What is the problem addressed by it? State the requirements for Kerberos.
(b) Outline the methods adopted for Pretty Good Privacy (PGP). Explain the digital signature services provided by PGP. - (a) Discuss the pay load key management issues.
--- Content provided by FirstRanker.com ---
(b) Explain in detail the secure socket layer protocol stack. - (a) Discuss the stages of a network intrusion.
(b) What are two common techniques used to protect a password file?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)