SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Code :9D06106a
M.Tech I Semester Regular & Supplementary Examinations, April 2011
NETWORK SECURITY & CRYPTOGRAPHY
(Digital Systems and Computer Electronics)
(For students admitted in 2009-2010 & 2010-2011 only)
Time: 3 hours Max Marks: 60
Answer any FIVE questions
All questions carry equal marks
⋆ ⋆ ⋆ ⋆ ⋆
1. (a) Differentiate between computer security and internet security.
(b) Explain the various security services in detail.
2. (a) Explain in detail about the RC5 algorithm.
(b) Draw and explain the architecture of triple DES algorithm.
3. (a) Explain with an example the encryption process by using RSA technique.
(b) With the help of flowchart explain the key distribution for connection oriented protocols.
4. (a) Discuss in detail about the Eulers Theorem.
(b) Write a detailed note on message authentication code.
5. (a) Explain with neat diagram, the architecture for message digest generation using SHA.
(b) Explain MD5 message digest algorithm.
6. (a) What are the differences between version 4 and 5 of Kerberos.
(b) Draw the generic transmission diagram for PGP and explain the same.
7. (a) Explain the SSL Record Protocol in detail.
(b) Write short notes on features and participants of SET.
8. Discuss in detail about the various types of firewalls.
⋆ ⋆ ⋆ ⋆ ⋆

Contenu connexe

Tendances

Cracking code and launching rocket
Cracking code and launching rocketCracking code and launching rocket
Cracking code and launching rocketAnggara Rahmat
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentssmumbahelp
 
9 d57206c real time operating systems
9 d57206c real time operating systems9 d57206c real time operating systems
9 d57206c real time operating systemsVinod Kumar Gorrepati
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Mumbai B.Sc.IT Study
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureNational Chengchi University
 
QRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingQRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingFabio Petrillo
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 

Tendances (11)

Cracking code and launching rocket
Cracking code and launching rocketCracking code and launching rocket
Cracking code and launching rocket
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignments
 
9 d57206c real time operating systems
9 d57206c real time operating systems9 d57206c real time operating systems
9 d57206c real time operating systems
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
Internet Technologies (May - 2018) [IDOL - Old Course | Question Paper]
 
Collatz Conjecture Research
Collatz Conjecture ResearchCollatz Conjecture Research
Collatz Conjecture Research
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structure
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
QRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive DebuggingQRS2016 - Towards Understanding Interactive Debugging
QRS2016 - Towards Understanding Interactive Debugging
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 

En vedette (15)

Status report i
Status report   iStatus report   i
Status report i
 
Power Supply Management
Power Supply ManagementPower Supply Management
Power Supply Management
 
Unit 6
Unit 6Unit 6
Unit 6
 
9 d55204 fpga architectures & applications
9 d55204 fpga architectures & applications9 d55204 fpga architectures & applications
9 d55204 fpga architectures & applications
 
Unit 1
Unit 1Unit 1
Unit 1
 
9 d57206b cryptography & network security
9 d57206b cryptography & network security9 d57206b cryptography & network security
9 d57206b cryptography & network security
 
Cc430f6137
Cc430f6137Cc430f6137
Cc430f6137
 
Doc
DocDoc
Doc
 
Unit 5
Unit 5Unit 5
Unit 5
 
Unit 2
Unit 2Unit 2
Unit 2
 
9 d57105 hardware software co design
9 d57105  hardware software co design9 d57105  hardware software co design
9 d57105 hardware software co design
 
Unit 7
Unit 7Unit 7
Unit 7
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
1st review
1st review1st review
1st review
 

Similaire à 9 d06106a network security & cryptography

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Data communication and_computer_networks
Data communication and_computer_networksData communication and_computer_networks
Data communication and_computer_networksNoor Siddiqui
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Connecting network
Connecting networkConnecting network
Connecting networkimacomobio
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestd436758
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networksguestac67362
 
TBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docTBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docBhupesh Rawat
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestac67362
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1guestd436758
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017YogeshDhamke2
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptximacomobio
 

Similaire à 9 d06106a network security & cryptography (20)

Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
Computer Networks Jntu Model Paper{Www.Studentyogi.Com}
 
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
C O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  N E T W O R K S  J N T U  M O D E L  P A P E R{Www
C O M P U T E R N E T W O R K S J N T U M O D E L P A P E R{Www
 
DC ISE QP E&TC.doc
DC ISE QP E&TC.docDC ISE QP E&TC.doc
DC ISE QP E&TC.doc
 
Data communication and_computer_networks
Data communication and_computer_networksData communication and_computer_networks
Data communication and_computer_networks
 
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
Digital Ic Applications Jntu Model Paper{Www.Studentyogi.Com}
 
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  I C  A P P L I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L I C A P P L I C A T I O N S J N T U M O D E L P A P E R{Www
 
Connecting network
Connecting networkConnecting network
Connecting network
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks1 Telecommunication Switching Systems And Networks
1 Telecommunication Switching Systems And Networks
 
TBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.docTBS 604 Mobile Computing.doc
TBS 604 Mobile Computing.doc
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
0502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set10502 Object Oriented Programming Through Java Set1
0502 Object Oriented Programming Through Java Set1
 
R09 distributed computing
R09 distributed computingR09 distributed computing
R09 distributed computing
 
Cs 68
Cs 68Cs 68
Cs 68
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Aca
AcaAca
Aca
 
Doc 20180130-wa0002
Doc 20180130-wa0002Doc 20180130-wa0002
Doc 20180130-wa0002
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 
Connecting Networks.pptx
Connecting Networks.pptxConnecting Networks.pptx
Connecting Networks.pptx
 
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers 1st Semester M Tech Computer Science and Engg  (Dec-2013) Question Papers
1st Semester M Tech Computer Science and Engg (Dec-2013) Question Papers
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

9 d06106a network security & cryptography

  • 1. Code :9D06106a M.Tech I Semester Regular & Supplementary Examinations, April 2011 NETWORK SECURITY & CRYPTOGRAPHY (Digital Systems and Computer Electronics) (For students admitted in 2009-2010 & 2010-2011 only) Time: 3 hours Max Marks: 60 Answer any FIVE questions All questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆ 1. (a) Differentiate between computer security and internet security. (b) Explain the various security services in detail. 2. (a) Explain in detail about the RC5 algorithm. (b) Draw and explain the architecture of triple DES algorithm. 3. (a) Explain with an example the encryption process by using RSA technique. (b) With the help of flowchart explain the key distribution for connection oriented protocols. 4. (a) Discuss in detail about the Eulers Theorem. (b) Write a detailed note on message authentication code. 5. (a) Explain with neat diagram, the architecture for message digest generation using SHA. (b) Explain MD5 message digest algorithm. 6. (a) What are the differences between version 4 and 5 of Kerberos. (b) Draw the generic transmission diagram for PGP and explain the same. 7. (a) Explain the SSL Record Protocol in detail. (b) Write short notes on features and participants of SET. 8. Discuss in detail about the various types of firewalls. ⋆ ⋆ ⋆ ⋆ ⋆