SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Code :9D06106a
M.Tech I Semester Regular & Supplementary Examinations, April 2011
NETWORK SECURITY & CRYPTOGRAPHY
(Digital Systems and Computer Electronics)
(For students admitted in 2009-2010 & 2010-2011 only)
Time: 3 hours Max Marks: 60
Answer any FIVE questions
All questions carry equal marks
⋆ ⋆ ⋆ ⋆ ⋆
1. (a) Differentiate between computer security and internet security.
(b) Explain the various security services in detail.
2. (a) Explain in detail about the RC5 algorithm.
(b) Draw and explain the architecture of triple DES algorithm.
3. (a) Explain with an example the encryption process by using RSA technique.
(b) With the help of flowchart explain the key distribution for connection oriented protocols.
4. (a) Discuss in detail about the Eulers Theorem.
(b) Write a detailed note on message authentication code.
5. (a) Explain with neat diagram, the architecture for message digest generation using SHA.
(b) Explain MD5 message digest algorithm.
6. (a) What are the differences between version 4 and 5 of Kerberos.
(b) Draw the generic transmission diagram for PGP and explain the same.
7. (a) Explain the SSL Record Protocol in detail.
(b) Write short notes on features and participants of SET.
8. Discuss in detail about the various types of firewalls.
⋆ ⋆ ⋆ ⋆ ⋆

Mais conteúdo relacionado

Mais procurados

Cracking code and launching rocket
Cracking code and launching rocketCracking code and launching rocket
Cracking code and launching rocketAnggara Rahmat
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentssmumbahelp
 
9 d57206c real time operating systems
9 d57206c real time operating systems9 d57206c real time operating systems
9 d57206c real time operating systemsVinod Kumar Gorrepati
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Mumbai B.Sc.IT Study
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureNational Chengchi University
 
QRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingQRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingFabio Petrillo
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 

Mais procurados (11)

Cracking code and launching rocket
Cracking code and launching rocketCracking code and launching rocket
Cracking code and launching rocket
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignments
 
9 d57206c real time operating systems
9 d57206c real time operating systems9 d57206c real time operating systems
9 d57206c real time operating systems
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
 
Collatz Conjecture Research
Collatz Conjecture ResearchCollatz Conjecture Research
Collatz Conjecture Research
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structure
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
QRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingQRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive Debugging
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 

Destaque (15)

Status report i
Status report   iStatus report   i
Status report i
 
Power Supply Management
Power Supply ManagementPower Supply Management
Power Supply Management
 
Unit 6
Unit 6Unit 6
Unit 6
 
9 d55204 fpga architectures & applications
9 d55204 fpga architectures & applications9 d55204 fpga architectures & applications
9 d55204 fpga architectures & applications
 
Unit 1
Unit 1Unit 1
Unit 1
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network security
 
Cc430f6137
Cc430f6137Cc430f6137
Cc430f6137
 
Doc
DocDoc
Doc
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit 2
Unit 2Unit 2
Unit 2
 
9 d57105 hardware software co design
9 d57105  hardware software co design9 d57105  hardware software co design
9 d57105 hardware software co design
 
Unit 7
Unit 7Unit 7
Unit 7
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
1st review
1st review1st review
1st review
 

Semelhante a 9 d06106a network security & cryptography

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Data communication and_computer_networks
Data communication and_computer_networksData communication and_computer_networks
Data communication and_computer_networksNoor Siddiqui
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestd436758
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestac67362
 
TBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docTBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docBhupesh Rawat
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestac67362
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestd436758
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017YogeshDhamke2
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptximacomobio
 

Semelhante a 9 d06106a network security & cryptography (20)

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
 
DC ISE QP E&TC.doc
DC ISE QP E&TC.docDC ISE QP E&TC.doc
DC ISE QP E&TC.doc
 
Data communication and_computer_networks
Data communication and_computer_networksData communication and_computer_networks
Data communication and_computer_networks
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
Connecting network
Connecting networkConnecting network
Connecting network
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
TBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docTBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.doc
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
R09 distributed computing
R09 distributed computingR09 distributed computing
R09 distributed computing
 
Cs 68
Cs 68Cs 68
Cs 68
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Aca
AcaAca
Aca
 
Doc 20180130-wa0002
Doc 20180130-wa0002Doc 20180130-wa0002
Doc 20180130-wa0002
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptx
 
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers 1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

9 d06106a network security & cryptography

  • 1. Code :9D06106a M.Tech I Semester Regular & Supplementary Examinations, April 2011 NETWORK SECURITY & CRYPTOGRAPHY (Digital Systems and Computer Electronics) (For students admitted in 2009-2010 & 2010-2011 only) Time: 3 hours Max Marks: 60 Answer any FIVE questions All questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆ 1. (a) Differentiate between computer security and internet security. (b) Explain the various security services in detail. 2. (a) Explain in detail about the RC5 algorithm. (b) Draw and explain the architecture of triple DES algorithm. 3. (a) Explain with an example the encryption process by using RSA technique. (b) With the help of flowchart explain the key distribution for connection oriented protocols. 4. (a) Discuss in detail about the Eulers Theorem. (b) Write a detailed note on message authentication code. 5. (a) Explain with neat diagram, the architecture for message digest generation using SHA. (b) Explain MD5 message digest algorithm. 6. (a) What are the differences between version 4 and 5 of Kerberos. (b) Draw the generic transmission diagram for PGP and explain the same. 7. (a) Explain the SSL Record Protocol in detail. (b) Write short notes on features and participants of SET. 8. Discuss in detail about the various types of firewalls. ⋆ ⋆ ⋆ ⋆ ⋆