0% found this document useful (0 votes)
30 views2 pages

IV-I-Reg-NETWORK SECURITY & CRYPTOGRAPHY

This document contains instructions for a Network Security and Cryptography exam. It has two parts: Part A contains 10 short answer questions worth 2 marks each for a total of 20 marks. Part B contains 5 sections with 2 questions each, worth 10 marks per question, for a total of 50 marks. Students must answer all questions in Part A and choose 1 question from each section in Part B to answer. The questions cover topics like attacks vs threats, Rail fence encryption, DES S-boxes, RSA encryption/decryption, digital signatures, HMAC design objectives, S/MIME, PGP signatures, IPsec tunnel mode, and intrusion detection systems.

Uploaded by

bodhu varun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views2 pages

IV-I-Reg-NETWORK SECURITY & CRYPTOGRAPHY

This document contains instructions for a Network Security and Cryptography exam. It has two parts: Part A contains 10 short answer questions worth 2 marks each for a total of 20 marks. Part B contains 5 sections with 2 questions each, worth 10 marks per question, for a total of 50 marks. Students must answer all questions in Part A and choose 1 question from each section in Part B to answer. The questions cover topics like attacks vs threats, Rail fence encryption, DES S-boxes, RSA encryption/decryption, digital signatures, HMAC design objectives, S/MIME, PGP signatures, IPsec tunnel mode, and intrusion detection systems.

Uploaded by

bodhu varun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

R17 Regulation Subject code: 1P7EA

TKR COLLEGE OF ENGINEERING AND TECHNOLOGY


(Autonomous, Accredited by NAAC with ‘A’ Grade)

B.Tech IV Year I Semester Regular Examinations, February 2021

NETWORK SECURITY & CRYPTOGRAPHY


(Computer Science and Engineering)

Maximum Marks: 70 Date:20.02.2021 Duration: 3 hours


Note: 1.This question paper contains two parts A and B.
2. Part A is compulsory which carries 20 marks. Answer all questions in Part A.
3. Part B consists of 5 Units. Answer any one full question from each unit.
4. Each question carries 10 marks and may have a, b, c, d as sub questions.
Part-A
All the following questions carry equal marks (10x2M=20 Marks)

1 Differentiate attack and threat.


2 Show how to convert the given text “TKREngg” into cipher text using Rail fence
technique.
3 Summarize the purpose of S-boxes in DES.
4 Evaluate the formula for encryption and decryption using RSA algorithm.
5 Explain digital signature differs from authentication protocols?
6 Illustrate the design objectives of HMAC.
7 Define S/MIME.
8 Why does PGP generate a signature before applying compression?
9 Describe tunnel mode in IP security.
10 Differentiate host based intrusion detection system and network based intrusion detection
system.
Part-B
Answer All the following questions. (10M X 5=50Marks)

11 (a) What is Steganography? Briefly examine any three techniques used. (4M)
(b) What is mono-alphabetic cipher? Examine how it differs from Caesar cipher? (6M)
OR
12 With a neat block diagram, explain the network security model and the important
parameters associated with it.(10M)

13 Describe the Elliptic curve cryptography with an example. (10M)


OR
14 Explain briefly about Diffie-Hellman key exchange algorithm with its pros and
cons.(10M)

Page 1 of 2
15 What is Digital Signature? Explain how it is created at the sender end and retrieved at
receiver end. (10M)
OR
16 Explain briefly about the architecture and certification mechanisms in Kerberos and
X.509.(10M)

17 Evaluate the different protocols of SSL. (10M)


OR
18 Demonstrate Secure Electronic Transaction with neat diagram. (10M)

19 (a) Discuss about the authentication header of IP. (5M)


(b) Summarize Encapsulating Security Payload of IP. (5M)
OR
20 (a) Discuss the role of intrusion detection system? What are the three benefits that can be
provided by the intrusion detection system? (5M)
(b) Discuss the architecture of distributed intrusion detection system with the necessary
diagrams. (5M)

Page 2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy