FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem Supply 2018 Feb 9D06106a Network Security And Cryptography Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester Supply 2018 Feb 9D06106a Network Security And Cryptography Previous Question Paper || Download M.Tech 2nd Sem 9D06106a Network Security And Cryptography Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Firstranker's choice

FirstRanker.com

Code: 9D06106a

--- Content provided by FirstRanker.com ---

FirstRanker.com

Time: 3 hours

M.Tech II Semester Supplementary Examinations February 2018

NETWORK SECURITY & CRYPTOGRAPHY

(Electronics & Communication Engineering)

--- Content provided by FirstRanker.com ---

(For students admitted in 2012, 2013, 2014, 2015 & 2016 only)

Answer any FIVE questions

All questions carry equal marks

Max. Marks: 60


  1. (a) Discuss a model for network security. Explain the broad categories of security mechanisms needed to cope with unwanted access.

    --- Content provided by FirstRanker.com ---

    (b) Explain about the following terms: (i) Security service. (ii) Steganography.
  2. (a) Describe theory of block cipher design.
    (b) Discuss about key generation, verification and updating.
    (c) What is RC5? Explain four modes of operation in it.
  3. (a) In a RSA system, the public key of a given user e = 31, n = 3599. What is the private key of this user?

    --- Content provided by FirstRanker.com ---

    (b) What are the roles of the public and private key?
    (c) Illustrate Diffie-Hellman key exchange scheme for GF(P).
  4. (a) Using Fermat's theorem, find 3201 mod 11.
    (b) Explain in detail about extended Euclid's algorithm.
    (c) What is the difference between message authentication code and one-way hash function? What are the possible attacks against this scheme?
  5. --- Content provided by FirstRanker.com ---

  6. (a) Explain about RIPEMD – 160 signature scheme.
    (b) Discuss about: (i) Authentication protocols. (ii) Digital signature standards.
  7. (a) What is Kerberos? What is the problem addressed by it? State the requirements for Kerberos.
    (b) Outline the methods adopted for Pretty Good Privacy (PGP). Explain the digital signature services provided by PGP.
  8. (a) Discuss the pay load key management issues.

    --- Content provided by FirstRanker.com ---

    (b) Explain in detail the secure socket layer protocol stack.
  9. (a) Discuss the stages of a network intrusion.
    (b) What are two common techniques used to protect a password file?

FirstRanker.com


--- Content provided by FirstRanker.com ---


This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)