Anna University Previous Years Question Papers
Question paper code: 71763
B.E, B.TECH DEGREE EXAMINATION,APRIL/MAY-2015
Seventh semester
Computer science and Engineering
IT 2352/IT 62/10144 IT603/10144 CSE 46- CRYPTOGRAPHY AND NETWORK SECURITY
(Common to sixth semester information Technology)
(Regulation 2008/2010)
(common to PTIT 2352-cryptography and network security for B.E(PART-TIME) seventh semester- Computer science and Engineering- Regulation 2009)
Time- Three hour
Maximum mark-100
Answer all questions
PART A-10X2=20 marks
1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 13.
3. Differentiate between steam ciphers and block ciphers.
4. State view application of RC4 algorithm.
5. What is primitive roots?
6. What is digital signature?
7. What are certificate revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantages of intrusion detection system over firewall?
PART B 5X16=80 MARKS
11.(a) Explain the substitution encryption technique in detail.
(or)
(b) State the drive
(i)Fermate’s theorem
(ii)Euler’s theorem
12.(a) Explain the data encryption standard (DES) in detail.
(or)
(b) Explain the RSA algorithm in detail. For the given value, trace the sequence of calculation in RSA. P=7, q=13,e=5,and m=10.
13.(a) Explain ELG amal public key cryptosystem with an example.
(or)
(b) Explain secure Hash in detail.
14.(a) Explain kerberos version 4 in detail.
(or)
(b) Explain secure socket layer in detail.
15.(a)Wirte brief notes on following;
(i) Classification of viruses
(ii) Worm counter of measure
(or)
(b) Explain the character and types of firewall.
Question paper code: 71763
B.E, B.TECH DEGREE EXAMINATION,APRIL/MAY-2015
Seventh semester
Computer science and Engineering
IT 2352/IT 62/10144 IT603/10144 CSE 46- CRYPTOGRAPHY AND NETWORK SECURITY
(Common to sixth semester information Technology)
(Regulation 2008/2010)
(common to PTIT 2352-cryptography and network security for B.E(PART-TIME) seventh semester- Computer science and Engineering- Regulation 2009)
Time- Three hour
Maximum mark-100
Answer all questions
PART A-10X2=20 marks
1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 13.
3. Differentiate between steam ciphers and block ciphers.
4. State view application of RC4 algorithm.
5. What is primitive roots?
6. What is digital signature?
7. What are certificate revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantages of intrusion detection system over firewall?
PART B 5X16=80 MARKS
11.(a) Explain the substitution encryption technique in detail.
(or)
(b) State the drive
(i)Fermate’s theorem
(ii)Euler’s theorem
12.(a) Explain the data encryption standard (DES) in detail.
(or)
(b) Explain the RSA algorithm in detail. For the given value, trace the sequence of calculation in RSA. P=7, q=13,e=5,and m=10.
13.(a) Explain ELG amal public key cryptosystem with an example.
(or)
(b) Explain secure Hash in detail.
14.(a) Explain kerberos version 4 in detail.
(or)
(b) Explain secure socket layer in detail.
15.(a)Wirte brief notes on following;
(i) Classification of viruses
(ii) Worm counter of measure
(or)
(b) Explain the character and types of firewall.
0 comments:
Pen down your valuable important comments below