FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem 2019 Feb 17D08102 Network Security And Cryptography Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester 2019 Feb 17D08102 Network Security And Cryptography Previous Question Paper || Download M.Tech 2nd Sem 17D08102 Network Security And Cryptography Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Code: 17D08102

FirstRanker.com

M.Tech II Semester Supplementary Examinations January/February 2019

--- Content provided by FirstRanker.com ---

NETWORK SECURITY & CRYPTOGRAPHY

(Common to CSE & CS)

(For students admitted in 2017 only)

Time: 3 hours

Max. Marks: 60

--- Content provided by FirstRanker.com ---

Answer all the questions

*****

  1. C = (P x K₁ + K₂) mod26; P = ((C-K₂) x K₁⁻¹) mod26 is the affine cipher to encrypt and decrypt with mod26 where K₁⁻¹ is the multiplicative inverse of K₁ and –K₂ is the additive inverse of K₂. Use it to encrypt the message "Helo” to “ZEBW” with the key pair (7, 2) in mod26. Again decrypt the message "ZEBW" with the key pair (7, 2) in mod26.

    OR

    Differentiate between block and stream ciphers. Explain the block cipher modes of operations? What are the attacks on block ciphers?

    --- Content provided by FirstRanker.com ---

  2. Explain the encryption, decryption and key generation in RSA with neat diagrams. Also write the pseudo code associated with them? Give the taxonomy of practical attacks on RSA.

    OR

  3. Give an overview of SHA-512 by explaining processing steps very clearly.

    --- Content provided by FirstRanker.com ---

  4. Distinguish between MDC (modification detection code) and MAC (message authentication code).

    OR

    What is digital signature and what process involved in it? Differentiate between conventional and digital signatures. How it provides the major security service directly? What are the possible attacks over it?

  5. --- Content provided by FirstRanker.com ---

  6. One of the major roles of public-key encryption has been to address the problem of key distribution, with two distinct aspects:

    (i) The distribution of public keys.

    (ii) The use of public-key encryption to distribute secret keys.

    Explain clearly with neat encryption to distribute secret keys.

    OR

    --- Content provided by FirstRanker.com ---

    The pretty good privacy (PGP) secure email program, is a remarkable phenomenon, has grown explosively and is now widely used. The actual operation of PGP consists of five services: authentication, confidentiality, compression, e-mail compatibility and segmentation. Explain each service very clearly with proper steps.

  7. By implementing security at the IP level, an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security-ignorant applications. Write about IP security: Uses, benefits and services. What is encapsulating security payload?

    OR

    What is a firewall and limitations? Explain in detail the three common types of firewalls: Packet filters, application-level gateways & circuit-level gateways?

    --- Content provided by FirstRanker.com ---

*****

FirstRanker.com


--- Content provided by FirstRanker.com ---


This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)