FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem 2017 Feb 9D06106a Network Security And Cryptography Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester 2017 Feb 9D06106a Network Security And Cryptography Previous Question Paper || Download M.Tech 2nd Sem 9D06106a Network Security And Cryptography Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Firstranker's choice

FirstRanker.com

Code: 9D06106a

--- Content provided by FirstRanker.com ---

FirstRanker.com

M.Tech II Semester Supplementary Examinations January/February 2017

NETWORK SECURITY & CRYPTOGRAPHY

(Electronics & Communication Engineering)

Time: 3 hours

--- Content provided by FirstRanker.com ---

Max. Marks: 60

Answer any FIVE questions

All questions carry equal marks


  1. (a) What are the various services to be offered for enhancing the security of the information processing system?
    (b) Explain the different security attacks in detail.
  2. --- Content provided by FirstRanker.com ---

  3. (a) Explain a symmetric encryption scheme and its ingredients.
    (b) Explain the block cipher which is a Feistel structure that makes use of key dependent S-boxes.
  4. (a) State and prove Fermat's and Euler's theorem.
    (b) Explain Diffie – Hellman key exchange algorithm.
  5. (a) Explain how message authentication is achieved.

    --- Content provided by FirstRanker.com ---

    (b) What is Hash function? Explain some approaches for producing message authentication.
  6. (a) Explain the functioning of HMAC algorithm.
    (b) What is the difference between Hash and MAC functions?
  7. (a) Discuss the concepts of trusted systems.
    (b) Explain how X-509 authentication service works.
  8. --- Content provided by FirstRanker.com ---

  9. (a) Explain the IP security architecture in detail.
    (b) What are the three threats associated with user authentication over a network or internet and explain the same.
  10. (a) List and briefly explain three classes of intruders.
    (b) Explain how two way authentication header guards against the replay attack.

FirstRanker.com

--- Content provided by FirstRanker.com ---



This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)

--- Content provided by FirstRanker.com ---