0% found this document useful (0 votes)
98 views2 pages

07TE762

This document contains exam questions for a Cryptography and Network Security course. It is divided into two parts, with multiple choice and descriptive questions covering topics such as: - Network security models and access control - Types of security attacks and encryption schemes - Symmetric ciphers like DES and simpler-DES - Message authentication codes and hash functions - Public key cryptography algorithms and standards like PGP, X.509 certificates, and SSL - Intrusion detection systems, firewalls, and other network security technologies

Uploaded by

Shiva Shankar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views2 pages

07TE762

This document contains exam questions for a Cryptography and Network Security course. It is divided into two parts, with multiple choice and descriptive questions covering topics such as: - Network security models and access control - Types of security attacks and encryption schemes - Symmetric ciphers like DES and simpler-DES - Message authentication codes and hash functions - Public key cryptography algorithms and standards like PGP, X.509 certificates, and SSL - Intrusion detection systems, firewalls, and other network security technologies

Uploaded by

Shiva Shankar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

07TE762 USN R. V.

COLLEGE OF ENGINEERING
Autonomous Institution under VTU VII Semester B. E. Examinations Dec-10/Jan-11

Telecommunication Engineering
CRYPTOGRAPHY AND NETWORK SECURITY (ELECTIVE) Time: 03 Hours Maximum Marks: 100 Instructions to candidates: Answer FIVE full questions selecting atleast TWO questions from PART-A and TWO questions from PART-B.

PART- A 1 a With a neat diagram, briefly describe the general model of network security. Define a model for network Access security for unwanted access such as hackers and software threats. b What are the two types of security attacks? Explain with two examples for each. c Give a comparison between unconditionally secure and computationally secure encryption scheme. 2 a Show the difference between monoalphabetic and polyalphabetic ciphers. Explain their advantages and weaknesses against crypt analysis. b With a neat diagram explain the single round of DES encryption. c Using simpler-DES generate two 8-Bit sub-keys from a 10-Bit key. P8 Table 6 3 7 4 8 5 10 9 key input 1010001010(10 Bits) Generate 2 sub keys K1 and K2. ( 8Bits) 3 a Define the message authentication (MAC)and Hash Functions (H) and show how the confidentially and Authentication are achieved using Hash Coding. b Derive message Authentication Code based on DES. c Give the Authentication Dialogue for Kerberos-ver-4.Explain the difference between version-4 and 5.

08 08 04

06 08

06

08 04 08

4 a Describe the five services provided by PGP (Pretty Good privacy). b With a diagram explain the Format for X-509 certificate. c Briefly explain various MIME transfer Encodings. PART- B 5 a Explain the transport and Tunnel mode for IP security providing Secured Communication. b What is security Association? Give the Basic Combinations of SA. c Mention important features of Oakley key algorithm. 6 a Explain the operation of SSL Record protocol. b Define the principal categories of SET (Secure Electric Transactions) participants. c Mention parameters used to define session states and connection states in SSL specifications. 7 a Give an architecture for the distributed intrusion detection system and explain. b Explain the password management in UNIX. c Explain Honeypot intrusion Detection Technology. 8 a Give the taximony of Malicious programs and explain. b With diagrams illustrate common types of firewalls. c Write short notes on any two of the following: a. Radix 64-conversion. b. Virus life cycle c. Boston Host d. Worm propagation e. Application level gateway.

08 06 06

08 08 04 08 06 06 08 06 06 06 06

08

You might also like