0% found this document useful (0 votes)
93 views2 pages

29 Cryptography and Network Security May June 2019

This document is a question paper for the 6th semester BCA examination in Computer Science. It contains 4 sections - 1) Section A contains 10 multiple choice questions worth 2 marks each. 2) Section B contains 5 questions worth 5 marks each. 3) Section C contains 3 questions worth 15 marks each with 2 subparts. 4) Section D contains 2 questions worth 10 marks each. The questions cover topics in cryptography like cryptosystems, ciphers, hashing, public key cryptography, digital signatures, SSL, IPSec etc. Students are required to answer questions from each section carrying varying marks totaling to the maximum marks of 100.

Uploaded by

Keerthana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views2 pages

29 Cryptography and Network Security May June 2019

This document is a question paper for the 6th semester BCA examination in Computer Science. It contains 4 sections - 1) Section A contains 10 multiple choice questions worth 2 marks each. 2) Section B contains 5 questions worth 5 marks each. 3) Section C contains 3 questions worth 15 marks each with 2 subparts. 4) Section D contains 2 questions worth 10 marks each. The questions cover topics in cryptography like cryptosystems, ciphers, hashing, public key cryptography, digital signatures, SSL, IPSec etc. Students are required to answer questions from each section carrying varying marks totaling to the maximum marks of 100.

Uploaded by

Keerthana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

103547

No. of Printed'Pages : 2
I llililr l]lll il ]ilt il]t lil tilt

GS-644
VI Semester B.C.A. Examination, MaylJune - 2OL9
COMPUTER SCIENCE
BCA 60g : CRYPTOGRAPHY AND NETWORK SECURITY
(CBCS) (F+R)(2016-17 & Onwards)
Time : 3 Hours Max. Marks : 100
Instntctions : Ansuter all tlrc sections.
SEICTION - A
Answer any ten questions. Each question carries two marks. LOx2=2O
1. Define Cryptography.
.
2. Distinguish between active and passive attacks.
3. Define Integrity and Non-repudiation.
4. Find the GCD of 16 and 48.
5. Define Padding in block cipher.
6. Define Resedue class.
7. Estimate the block size of MDs.
8. Deflne S/MIME.
9. What is Kerberos ?
10. Define the Diffie - Hellman protocol.
11. List any 2 applications of X.5O9 certificate.
L2. Define Hijacking
SECTION - B
Answer any fiive questions. Each question carries five marks. 5x5=25
I

13.t Compare steganography and watermarking. 5


14. State and explain the principles of public key cryptography. 5
15. With a neat diagram explain the general structure of DES. 5

P.T.O.
GS-644 2 I ililll |ilil il lllll llll llll llll
5
16. Explain Transposition cipher with an example'
5
L7. State the important properties of public key encryption scheme'
5
18. Why SHA more secure than MD5 ?
b
19. Briefly explain the architecture of SSL'
5
20. Explain Tunnel mode of IPSec'
SEICTION - C
3x15=45
Answer any three questions. Each question carries fifteen
marks'
8
2L.(a)Brieflyexplainthemod"elofconventionalcryptosystem.

lq o -zf

i
(b) Find det.A if
^=l; ; :] 7

8
22. (a) Explain the four stages of AES algorithm
;
7
(b) Explain the rules of play fair cipher with an example'
10
29. (a) Explain the procedure for RSA cryptosystem'
cryptography' 5
(b) Differentiate between symmetric and Asymmetric key
Digital Signature with a neat diagram. I
24. (a) Explain the worki''*
:f service for 7
(b) How does PGP provicie confrdentiality and authentication
e-mail ? ExPlain'
8
25. (a) List and explain the four protocols of SSL'
7
(b) ExPlain X.509 certificate
SDCTION . D
ten marks' lx1O=1O
Answer any one question' Each question carries
10
26. Discuss in detail block cipher modes of operations'
10
27. List and explain the properties of Hash functions'
-oOo-

You might also like