07TE762
07TE762
COLLEGE OF ENGINEERING
Autonomous Institution under VTU VII Semester B. E. Examinations Dec-10/Jan-11
Telecommunication Engineering
CRYPTOGRAPHY AND NETWORK SECURITY (ELECTIVE) Time: 03 Hours Maximum Marks: 100 Instructions to candidates: Answer FIVE full questions selecting atleast TWO questions from PART-A and TWO questions from PART-B.
PART- A 1 a With a neat diagram, briefly describe the general model of network security. Define a model for network Access security for unwanted access such as hackers and software threats. b What are the two types of security attacks? Explain with two examples for each. c Give a comparison between unconditionally secure and computationally secure encryption scheme. 2 a Show the difference between monoalphabetic and polyalphabetic ciphers. Explain their advantages and weaknesses against crypt analysis. b With a neat diagram explain the single round of DES encryption. c Using simpler-DES generate two 8-Bit sub-keys from a 10-Bit key. P8 Table 6 3 7 4 8 5 10 9 key input 1010001010(10 Bits) Generate 2 sub keys K1 and K2. ( 8Bits) 3 a Define the message authentication (MAC)and Hash Functions (H) and show how the confidentially and Authentication are achieved using Hash Coding. b Derive message Authentication Code based on DES. c Give the Authentication Dialogue for Kerberos-ver-4.Explain the difference between version-4 and 5.
08 08 04
06 08
06
08 04 08
4 a Describe the five services provided by PGP (Pretty Good privacy). b With a diagram explain the Format for X-509 certificate. c Briefly explain various MIME transfer Encodings. PART- B 5 a Explain the transport and Tunnel mode for IP security providing Secured Communication. b What is security Association? Give the Basic Combinations of SA. c Mention important features of Oakley key algorithm. 6 a Explain the operation of SSL Record protocol. b Define the principal categories of SET (Secure Electric Transactions) participants. c Mention parameters used to define session states and connection states in SSL specifications. 7 a Give an architecture for the distributed intrusion detection system and explain. b Explain the password management in UNIX. c Explain Honeypot intrusion Detection Technology. 8 a Give the taximony of Malicious programs and explain. b With diagrams illustrate common types of firewalls. c Write short notes on any two of the following: a. Radix 64-conversion. b. Virus life cycle c. Boston Host d. Worm propagation e. Application level gateway.
08 06 06
08 08 04 08 06 06 08 06 06 06 06
08