FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem 2019 Feb 17D08102 Network Security And Cryptography Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester 2019 Feb 17D08102 Network Security And Cryptography Previous Question Paper || Download M.Tech 2nd Sem 17D08102 Network Security And Cryptography Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Code: 17D08102

FirstRanker.com

M.Tech II Semester Supplementary Examinations January/February 2019

--- Content provided by‍ FirstRanker.com ---

NETWORK SECURITY & CRYPTOGRAPHY

(Common to CSE & CS)

(For students admitted in 2017 only)

Time: 3 hours

Max. Marks: 60

--- Content provided by‍ FirstRanker.com ---

Answer all the questions

*****

  1. C = (P x K1 + K2) mod26; P = ((C-K2) x K1?¹) mod26 is the affine cipher to encrypt and decrypt with mod26 where K1?¹ is the multiplicative inverse of K1 and –K2 is the additive inverse of K2. Use it to encrypt the message "Helo” to “ZEBW” with the key pair (7, 2) in mod26. Again decrypt the message "ZEBW" with the key pair (7, 2) in mod26.

    OR

    Differentiate between block and stream ciphers. Explain the block cipher modes of operations? What are the attacks on block ciphers?

    --- Content provided by‌ FirstRanker.com ---

  2. Explain the encryption, decryption and key generation in RSA with neat diagrams. Also write the pseudo code associated with them? Give the taxonomy of practical attacks on RSA.

    OR

  3. Give an overview of SHA-512 by explaining processing steps very clearly.

    --- Content provided by FirstRanker.com ---

  4. Distinguish between MDC (modification detection code) and MAC (message authentication code).

    OR

    What is digital signature and what process involved in it? Differentiate between conventional and digital signatures. How it provides the major security service directly? What are the possible attacks over it?

  5. --- Content provided by‍ FirstRanker.com ---

  6. One of the major roles of public-key encryption has been to address the problem of key distribution, with two distinct aspects:

    (i) The distribution of public keys.

    (ii) The use of public-key encryption to distribute secret keys.

    Explain clearly with neat encryption to distribute secret keys.

    OR

    --- Content provided by​ FirstRanker.com ---

    The pretty good privacy (PGP) secure email program, is a remarkable phenomenon, has grown explosively and is now widely used. The actual operation of PGP consists of five services: authentication, confidentiality, compression, e-mail compatibility and segmentation. Explain each service very clearly with proper steps.

  7. By implementing security at the IP level, an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security-ignorant applications. Write about IP security: Uses, benefits and services. What is encapsulating security payload?

    OR

    What is a firewall and limitations? Explain in detail the three common types of firewalls: Packet filters, application-level gateways & circuit-level gateways?

    --- Content provided by​ FirstRanker.com ---

*****

FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)