B.TECH DEGREE EXAMINATION, MAY 2014 Eight Semester Branch: Information Technology
IT010 802 CRYPTOGRAPHY AND NETWORK SECURITY
Time: 3 Hours
Max. Marks: 100 PART A Answer all questions Each carries 3 marks
1. Using Fermat’s Little theorem find the multiplicative inverse of 8 in Z17 2. Write down the difference between public key and private key cryptosystems 3. List out the parameters of AES 4. List out the functionality of S/MIME 5. What is an Intruder? Name three different classes of intruders PART B Answer all questions Each carries 5 marks
6. Explain any two methods for testing prime numbers. 7. Using play fair cipher algorithm encrypt the message using the key "MONARCHY" and explain 8. Describe about Hash functions 9. Write short notes on PGP 10. Explain about Distributed Denial of Service attacks
PART C Answer all questions Each carries 12 marks Module I
11. Explain about Chinese Remainder theorem and Euler’s theorem with suitable examples. OR 12. (a ) Solve the set of following three equations: 3x+5y+7z ≡3(mod16) x +4y+13z ≡5(mod16) 2x+7y+3z ≡4(mod16) (b) What is the remainder after dividing 350 by 7? Module II 13. Explain the Key Generation, Encryption and Decryption of DES algorithm in detail. OR 14. Discuss the classical cryptosystems. Module III 15. Discuss discrete logarithms and explain briefly about Diffie Hellman key exchange algorithm with its pros and cons. OR 16. (a) Write a detailed note on Digital signatures. (b)Write the notes on ECC encryption, decryption and security. Module IV 17. Explain X.509 Authentication service. OR 18. Explain Kerberos. Module V 19. Explain in detail about definition, characteristics, types and limitations of firewalls. OR 20. Explain in detail types and countermeasures related to viruses.
Mahatma Gandhi University B.Tech IT 2014 Sem 8 Cryptography ...
Discuss discrete logarithms and explain briefly about Diffie Hellman key exchange ... University B.Tech IT 2014 Sem 8 Cryptography & Network Security.pdf.
Give an example of a failure pattern and a failure detector ... token. Give a scenario in which first node 5, then node 4, and then node 2 requests the ... In the t-Byzantine robust synchronizer of Lamport and Melliar â Smith, a correct ... Display
What are the disadvantages of message-oriented middleware? (8 marks) ... Mahatma Gandhi University M.Tech IT Sem 2 Trends in Middleware Systems P-I.pdf.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu. Whoops! There was a problem previewing Mahatma Gandhi University M.Tech IT Sem 1 Protocol Enginee
How in the Internet traffic is managed by using RMON. (7 marks). b. Write short note on Enterprise management solutions. (8 marks). c. Compare and contrast RMON1 and RMON2 (10 marks). 5.a. What is HFC Management and Broadband Network Management. (20
b) How to an elect a leader in a network? Explain. (15 marks). OR. 2. a) Give working principle of ... 3. a) Discuss Leader election in a Synchronous ring. (10 marks). b) Explain about Distributed ... Page 2 of 2. Main menu. Displaying Mahatma Gandhi
List the advantages and disadvantages of DSDV, AODV and DSR. ... Classify the routing protocols based on the routing topology in mobile ad-hoc networks ... Gandhi University M.Tech IT Sem 2 Wireless and Mobile Networks P-II.pdf. Page 1 ...
number of components of a plane graph G . ... b)Explain Hopcraft and Tarjan algorithm. ... examples, for Produce a strongly connected orientation (15 marks) ... Gandhi University M.Tech IT Sem 2 Advanced Topics in Graph Theory P-II.pdf.
5) With a neat sketch explain the working principle of hydraulic ram. ... Gandhi University B.Tech Mechanical Enginnering Sem 6 Industrial Hydraulics.pdf.
Mahatma Gandhi University M.Sc Chemistry Sem 2 Coordination Chemistry (2).pdf. Mahatma Gandhi University M.Sc Chemistry Sem 2 Coordination Chemistry ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
State Buckingham's π-theorem. 2. Explain the ... Displaying Mahatma Gandhi University B.Tech Mechanical Engineering Sem 7 Turbo Machine.pdf. Page 1 of 2.
M.TECH. DEGREE EXAMINATION. Branch: Computer Science and Engineering ... Descargar Historia del pensamiento polÃtico en la Edad Medi ...pdf. Leer en ...
Specialisation: Production and Industrial Engineering / Advanced Manufacturing .... Engineering Sem 1 Advanced Engineering Materials and Processing P-I.pdf.
Production rate is 3000 units/. month. ... (5 Marks). 7. (a) For what products does the e-commerce channel offer the greatest advantage? ... Displaying Mahatma Gandhi University M.Tech Sem 2 Supply Chain Management.pdf. Page 1 of 3.
Mahatma Gandhi University M.Tech Sem 2 Industrial Relations.pdf. Mahatma Gandhi University M.Tech Sem 2 Industrial Relations.pdf. Open. Extract. Open with.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
Mahatma Gandhi University B.A Sem 1 Methodology & Perspectives of Social Science.pdf. Mahatma Gandhi University B.A Sem 1 Methodology & Perspectives ...