0% found this document useful (0 votes)
31 views1 page

Cryptography and Network Security (CSE)

Uploaded by

kalyanvemula2204
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

Cryptography and Network Security (CSE)

Uploaded by

kalyanvemula2204
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Hall Ticket No: Question Paper Code : R15-10321

ANIL NEERUKONDA INSTITUTE OF TECHNOLOGY & SCIENCES


(AUTONOMOUS)
IV/IV B.Tech I-Semester Regular Examinations, October/November-2019
CRYPTOGRAPHY AND NETWORK SECURITY
(CSE)
Time : 3 hours Max Marks : 60
Answer ONE Question from each Unit
All Questions Carry Equal Marks
All parts of the questions must be answered at one place only.
UNIT-I
1. a. How would you describe a security service? (6M)
b. Discuss the six listed security services? (6M)
(OR)
2. a. Analyze the model for network security with a neat diagram. (8M)
b. How would you classify different categories of security mechanisms? (4M)

UNIT-II
3. a.
What is message authentication code? Give an example? (6M)
b.
Explain the working of RSA with an example. (6M)
(OR)
4. Summarize DES (Data Encryption Standard) with neat sketch. (12M)

UNIT-III
5. a. How do you solve the problem of key distribution using the key management? (8M)
b. Outline about private key management. (4M)
(OR)
6. Illustrate the working of Diffie-Hellman with an example. (12M)

UNIT-IV
7. a. Compare the version4 and version 5 of Kerberos? (6M)
b. How would you explain different the properties of Digital Signatures? (6M)
(OR)
8. a. Illustrate the public key encryption structure and requirements for public key (8M)
cryptography.
b. Summarize the Kerberos version 5 message exchanges. (4M)

UNIT-V
09. Briefly describe S/MIME certificate processing method. (12M)
(OR)
10. a. What do you mean by DDos attack? Discuss the counter measures for it? (6M)
b. Identify and describe the two categories of intrusion detection systems. (6M)

*****

You might also like