QP16 Network Security
QP16 Network Security
Sixth/Eighth Semester
(Regulation 2008)
PART B - (5 x 16 = 80 marks)
11. (a) Explain the features of block Ciphers and data encryption standards in
detail. (6+10)
Or
(b) Explain how symmetric encryption provides confidentiality with an
example. (16)
PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor
12. (a) (i) Define hash function. Explain the properties of hash functions. (8)
(ii) Describe Diffie - Hellman key exchange algorithm with an example.
(8)
Or
(b) (i) Discuss the digital signature standard and its algorithm with
example. (8)
(ii) Explain RSA public key cryptosystem with an example.. (8)
13. (a) Discuss about Kerberos X. 509 architecture and authentication services
in detail. (16)
Or
(b) (i) Describe IP security architecture in detail. (8)
(ii) Explain E-Mail application and MIME. (8)
14. (a) Explain various password management mechanisms with examples. (16)
Or
(b) Explain viruses and worms and the threats posed by them. (8+8)
15. (a) Explain the wireless LAN security factors and security mechanisms. (16)
Or
(b) Discuss the issues and solutions in wireless security. (16)
2 51158
PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor