This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
Firstranker's choice
Code: 9D06106a
--- Content provided by FirstRanker.com ---
M.Tech II Semester Supplementary Examinations January/February 2017
NETWORK SECURITY & CRYPTOGRAPHY
(Electronics & Communication Engineering)
Time: 3 hours
--- Content provided by FirstRanker.com ---
Max. Marks: 60
Answer any FIVE questions
All questions carry equal marks
- (a) What are the various services to be offered for enhancing the security of the information processing system?
(b) Explain the different security attacks in detail. - (a) Explain a symmetric encryption scheme and its ingredients.
(b) Explain the block cipher which is a Feistel structure that makes use of key dependent S-boxes. - (a) State and prove Fermat's and Euler's theorem.
(b) Explain Diffie – Hellman key exchange algorithm. - (a) Explain how message authentication is achieved.
--- Content provided by FirstRanker.com ---
(b) What is Hash function? Explain some approaches for producing message authentication. - (a) Explain the functioning of HMAC algorithm.
(b) What is the difference between Hash and MAC functions? - (a) Discuss the concepts of trusted systems.
(b) Explain how X-509 authentication service works. - (a) Explain the IP security architecture in detail.
(b) What are the three threats associated with user authentication over a network or internet and explain the same. - (a) List and briefly explain three classes of intruders.
(b) Explain how two way authentication header guards against the replay attack.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
--- Content provided by FirstRanker.com ---