FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem 2017 Feb 9D08205 Cryptography and Network Security Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester 2017 Feb 9D08205 Cryptography and Network Security Previous Question Paper || Download M.Tech 2nd Sem 9D08205 Cryptography and Network Security Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Firstranker's choice

Code: 9D08205

Time: 3 hours

--- Content provided by FirstRanker.com ---

FirstRanker.com

M.Tech II Semester Supplementary Examinations January/February 2017

CRYPTOGRAPHY & NETWORK SECURITY

(Computer Networks)

Answer any FIVE questions

--- Content provided by FirstRanker.com ---

All questions carry equal marks

  1. (a) Differentiate between:
    1. (i) Substitution and transportation ciphers.
    2. (ii) Symmetric and Asymmetric key cryptography.
    3. (iii) Passive and active attacks.
    4. (iv) Cryptography and steganography.
    5. --- Content provided by FirstRanker.com ---

    (b) Distinguish among vulnerability, threat and control.
  2. (a) Explain the round function used in DES with a neat diagram. (b) What primitive operations are used in RC4? Explain.
  3. (a) Give a brief note on attacks on RSA. (b) Explain the threats associated with a direct digital signature scheme.
  4. (a) What are the HMAC design objectives as per question? (b) With the help of neat diagrams, explain the varieties of ways in which a hash code is used to provide message authentication. How does a hash function differ from MAC?
  5. (a) What are the core components of a PKI? Briefly describe each component. (b) Give a brief note on PKCS.
  6. --- Content provided by FirstRanker.com ---

  7. (a) What do you mean by single sign-on approach? Mention its advantages. (b) Make comparisons between the certified based authentication and biometric authentication.
  8. (a) How an SSL session is established using SSL Handshake protocol? (b) List and explain the applications of IPSec.
  9. (a) Discuss about Markov model for the generation of guessable passwords. (b) What is a virus? How it is different from a worm? List some of the latest virus that you have listened about and describe how it has propagated.

FirstRanker.com


--- Content provided by FirstRanker.com ---


This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)