This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
Firstranker's choice
Code: 9D08205
Time: 3 hours
--- Content provided by FirstRanker.com ---
M.Tech II Semester Supplementary Examinations January/February 2017
CRYPTOGRAPHY & NETWORK SECURITY
(Computer Networks)
Answer any FIVE questions
--- Content provided by FirstRanker.com ---
All questions carry equal marks
- (a) Differentiate between:
- (i) Substitution and transportation ciphers.
- (ii) Symmetric and Asymmetric key cryptography.
- (iii) Passive and active attacks.
- (iv) Cryptography and steganography.
--- Content provided by FirstRanker.com ---
- (a) Explain the round function used in DES with a neat diagram. (b) What primitive operations are used in RC4? Explain.
- (a) Give a brief note on attacks on RSA. (b) Explain the threats associated with a direct digital signature scheme.
- (a) What are the HMAC design objectives as per question? (b) With the help of neat diagrams, explain the varieties of ways in which a hash code is used to provide message authentication. How does a hash function differ from MAC?
- (a) What are the core components of a PKI? Briefly describe each component. (b) Give a brief note on PKCS.
- (a) What do you mean by single sign-on approach? Mention its advantages. (b) Make comparisons between the certified based authentication and biometric authentication.
- (a) How an SSL session is established using SSL Handshake protocol? (b) List and explain the applications of IPSec.
- (a) Discuss about Markov model for the generation of guessable passwords. (b) What is a virus? How it is different from a worm? List some of the latest virus that you have listened about and describe how it has propagated.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)