0% found this document useful (0 votes)
61 views1 page

09-Network Security-1

The document is an exam for a Network Security course that contains 8 questions covering various topics: 1) Security attacks, services, and mechanisms. RFCs. 2) Chinese Remainder Process Theorem and applications. 3) The key expansion process of the Advanced Encryption Standard algorithm. 4) RSA public key encryption algorithm and calculating a user's private key from their public key. 5) How message digests provide authentication and X.509 directory authentication services. 6) VCAM and trusted computing base. 7) Phases of virus and worm operation and race conditions in software flaws. 8) Reference monitors, capability tickets, and

Uploaded by

sudhakar k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views1 page

09-Network Security-1

The document is an exam for a Network Security course that contains 8 questions covering various topics: 1) Security attacks, services, and mechanisms. RFCs. 2) Chinese Remainder Process Theorem and applications. 3) The key expansion process of the Advanced Encryption Standard algorithm. 4) RSA public key encryption algorithm and calculating a user's private key from their public key. 5) How message digests provide authentication and X.509 directory authentication services. 6) VCAM and trusted computing base. 7) Phases of virus and worm operation and race conditions in software flaws. 8) Reference monitors, capability tickets, and

Uploaded by

sudhakar k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

www.jntuworld.

com

Code No: D109118204 R09


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M.Tech I Semester Regular Examinations March 2010
NETWORK SECURITY - 1
(COMPUTER NETWORKS)
Time: 3hours Max.Marks:60
Answer any five questions
All questions carry equal marks
---

1. a. Discuss about the Security attacks, Security Services and Security Mechanisms.
b. Write short notes on RFC.

2. Explain Chinese Remainder Process Theorem and its applications.

3. Explain the Key Expansion process of Advanced Encryption Standards algorithm.

L D
4. a. Explain the procedure involved in RSA public key encryption algorithm.
b. In an RSA system, the public key of a given user is e=31, n=3599. What is the
private key of this user?

O R
5. a. Explain how Message Digest provides authentication.
b. Discuss X.509 Directory Authentication Services.

6. a. Write short notes VCAM.

U W
T
b. Discuss about Trusted computing base.

J N
7. a. What are the typical phases of operation of a Virus on Worm?
b. Discuss about the race conditions in Software flaws in detail.

8. a. Write short notes on the following:


i) Reference Monitor
ii) Capability Ticket.
b. Describe Firewalls design principles.

********

www.jntuworld.com

You might also like