For More Question Papers Visit - www.pediawikiblog.com
1,4SCS252
USN
Second Semester M.Tech. Degree Examinationo .Iuune/July
2CI
16
g. co m
Infornnation and Network $ecurity Time: 3 hrs.
Max. Marks:
lGO
Note: Amswer nny F'IYE.fitll questions. o.)
o o
ia.
;
b.
Explain the Feistal Cipher structure. Also explain the various parameter and design choices (tr2 Nlarks) which determine the actual algorithm of Feistal Cipher. (08 Marks) Explain the Avalanche effect.
o
a. b.
Explain with an example the Elgamal cryptosystem. Perform encryption and decryptiolr using the RSA algorithm for
q) :i
169
coo .= c\ 6d -t
gdi 00)a e(J
0()2
a. b.
Explain the following: i) Caesar cipher ii) Vernam cipher. Explain Diffie-Hellman key exchange.
a. b.
Explain with neat diagram the generai format of X.509 certificate. Brietly explain fbur general categories of scheme for distribution of public
5a. b.
ch=
ik
ll
(-
0s
a. b.
'oCd
3c) OE a4(') r^, gi-
a. b. c.
TE
oj.= 5/a
.\)
rr6
6.v =o0 ()=
::.
keys.
a. b.
sr
(05 &Earks) (10 l4arks)
What is S/MIME? Write the functions of S/MIME. Explain application of lPsec. Explain with a neat diagram encapsulating security payload
{05 $z[arks]
format.
Write the differences between version 4 and version 5 of Kerberos. Describe the function flow of domain keys identified mall.
*****
w
=o) ()
\r< _
(08 Marks) (12 Manks)
Explain in detail the IEEE 802.1 1 WLAN. (10 Marks) Briefly explain architecture and record protocol operations of secure sockets layer. (10 Marks)
w
oo-
(10 Marks)
w
6:
.p ed
o
>q .G'
(10 Marks)
Explain packet exchanges and packet fonnation of secure shell transport layer protocol.
cg
ss=
- 7 and
Differentiate betu,een conventional encryption and public key encryption. (05 Marks) List and briefly define types of cryptanalytic attacks based on what is knor,vn to the attacker.
O()
do
e
(88 Marks)
w
-oo
I::3, Q: li,
ia
6(J
;(n
:5.
ib
M
oC-
(tr2 Marks)
lo
li
c.t
c.)
o
z tr !.
o
cE
For More Question Papers Visit - www.pediawikiblog.com
Information & Network Security July 2016 (2014 Scheme).pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
Explain the requirernents to built a computer networks that will supp;r,t different. applications. : (10 hlarks). Brietly discuss the different performance metrics of- ...
Page 1 of 1. 14CSE41. USN. At'). J. (). (.) o. ti. a. d. C). C) L. (.) X oo-. -Y- cge. =\.) -oo ll. qoo .= c\ d$. i'r b0. e8. Li Lr oBa. 0()2. bu. o0i (g(! !b. >Ta6tr= â¬(â¬. oPa- o.
2 Mr. Harish retired on 31" Jan 2016 from a private company after 30 years a d I months of. service. .... surgical instrument is allowed @ 15% and book rcA%.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
4 Explain the concept of Mystery shopping. 5 What are the hard and ... with diners and annexe *eie some of the strategies tried out by the company. Advertising ...
Mention the important features of Oakley algorithm. ,(05 ~arks). (. 8 a. Discuss the SSL protocol stack. b. Explain key features of SET. c. Describe the components ...
4 State the measures for detecting and prcventing shoplifting. 5 What are"the factors influencing retail price? 6 Briefly- state opportunities for retailing in online.
6 Briefly- state opportunities for retailing in online. 7 What is an ... What is the importance of technology in today's retail business with reference. d. What are the ...
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu. Whoops! There was a problem p
Illustrate the aggregate analysis of amortized analysis on the operation INCREN{ENT in a ... Write the procedr-rral steps of the llSA public-key cryptosystem. Also ...
There was a problem previewing this document. Retrying... Download. Connect more ... Network and information security 2013.pdf. Network and information ...
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.
I responded to my friend from Luke 8:15. and Matthew 13:23 in a few translations, â4th. soil: noble and good heart, honest, hear God's. word and understand it, ...