100% found this document useful (1 vote)
918 views1 page

54115-mt - Network Security & Cryptography

This document contains an exam for a Network Security & Cryptography course. It lists 8 questions covering various cryptography and network security topics. The questions cover symmetric and asymmetric encryption algorithms, hash functions, digital signatures, key exchange protocols, authentication protocols like Kerberos, public key infrastructure standards, VPN encryption modes, and other network security topics like PGP and firewall design. Students have to answer any 5 of the 8 questions in the exam.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
918 views1 page

54115-mt - Network Security & Cryptography

This document contains an exam for a Network Security & Cryptography course. It lists 8 questions covering various cryptography and network security topics. The questions cover symmetric and asymmetric encryption algorithms, hash functions, digital signatures, key exchange protocols, authentication protocols like Kerberos, public key infrastructure standards, VPN encryption modes, and other network security topics like PGP and firewall design. Students have to answer any 5 of the 8 questions in the exam.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Code No: 54115/MT

NR
M.Tech. – I Semester Supplementary Examinations,
September, 2008

NETWORK SECURITY & CRYPTOGRAPHY


(Common to Digital Systems & Computer Electronics/ Digital
Electronics & Communication Systems/ Information Technology)

Time: 3hours Max. Marks:60

Answer any FIVE questions


All questions carry equal marks
---

1.a) Describe the security mechanism defined in X.800


b) What is transposition cipher? Explain the encryption process with
an example.

2.a) Describe S-DES encryption algorithm.


b) Describe the avalanche effect in DES.
c) What are the characteristics of advanced symmetric block ciphers?

3.a) Describe key distribution technique.


b) Describe Diffie-Hellman key exchange algorithm.

4.a) Describe an attractive and popular algorithm to determine whether


the given number is prime.
b) Illustrate different ways in which a hash code can be used to
provide message authentication.

5.a) Describe the steps involved in secure hash algorithm (SHA-I)


b) What is the difference between direct and arbitrated digital
signature?
c) What are the differences in crypto system and digital signature?

6.a) What are the principal difference between versions 4 and versions
5 for kerberos?
b) What are the technical deficiencies of kerberos version 4 protocol?
c) Describe X.509 alternative authentication procedures.

7.a) What are the issues in Web Security?


b) Distinguish between transport mode and tunnel mode encryption
in the IPSec ESP service.
c) Explain the key management portion of IPSec.

8. Write short notes on:


a) Pretty Good Privacy
b) Firewall design principles
c) Message authentication.

$$$

You might also like