0% found this document useful (0 votes)
309 views1 page

9D57206b Cryptography & Network Security

The document appears to be exam questions for a M.Tech Cryptography and Network Security course covering topics such as block ciphers, key distribution, RSA cryptography, hash functions, Kerberos authentication, IP security, firewalls, wireless LAN security, attack taxonomy, message digest algorithms, encryption techniques, hardening strategies, and layer 2 security protocols. The questions test understanding of the computational aspects, attacks, properties, and implementations of various cryptographic algorithms and network security measures.

Uploaded by

Nagarjuna Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
309 views1 page

9D57206b Cryptography & Network Security

The document appears to be exam questions for a M.Tech Cryptography and Network Security course covering topics such as block ciphers, key distribution, RSA cryptography, hash functions, Kerberos authentication, IP security, firewalls, wireless LAN security, attack taxonomy, message digest algorithms, encryption techniques, hardening strategies, and layer 2 security protocols. The questions test understanding of the computational aspects, attacks, properties, and implementations of various cryptographic algorithms and network security measures.

Uploaded by

Nagarjuna Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

www.jntuworld.

com

www.jwjobs.net

Code: 9D57206b

M.Tech - II Semester Supplementary April/May 2012 Examinations (for students admitted in 2009- 10 & 2010-11 only) CRYPTOGRAPHY & NETWORK SECURITY
(Common to VLSIS, VLSISD, VLSI & VLSID) Time: 3 hours Answer any FIVE Questions All Questions carry equal marks ***** 1. (a) What is a block cipher? List out supporting principles. Explain briefly data encryption standard. (b) Discuss the importance of key distribution in symmetric encryption. Explain the role of random numbers. 2. (a) Discuss the computational aspects of RSA with example. List out possible approaches to attack RSA. (b) Discuss the properties of hash functions. Explain its role in birthday attack. 3. (a) What problem was Kerberos designed to address? Discuss authentication dialogue format in various versions. (b) Discuss the fields of authentication header in IP security. List the key features of set. 4. (a) Discuss the terminology of malicious programs with example. (b) List the goals of firewalls. Explain different types. Discuss the advantages of trusted systems with examples. 5. Briefly discuss wireless LAN security factors issues. Max. Marks: 60

6. (a) Explain attack taxonomy with example. (b) List out specific attack results explain data security. 7. (a) Discuss message digest algorithm with example. (b) Compare and contrast between conventional and modern encryption techniques. 8. (a) Discuss the components of hardening strategy. Explain supporting host operating systems. (b) Discuss the role of protocols in layer 2 security considerations.

T N

W U
*****

R O

D L

www.jntuworld.com

You might also like