Sie sind auf Seite 1von 2
&] El Wve Re - EXT Sear Vy Ret Dela bomprent b tronge QP Code :15372 (3 Hours) [ Total Marks N.B.: (1) Question No.1 is compulsory. (2) Attempt any four questions from remaining six. (3) Assume suitable data wherever necessary with proper Justification. (a) Discuss the basic data compression techniques with suitable examples, (b) Explain predictive coding techniques for compression (©) Explain Chinese remainder algorithm with example. (@) What is the difference between MDC and MAC? Explain criteria for cryptographic hash function. (@) Design a minimum variance huflinan code for a source that pet out letter from an alphabet A={a,,,,258,,25,4,} with P(a,)=P (a,)=0.2, P(a,)=0.25 , P(a,)=0.05, P(a.)=0.15, Pla,)-0.15 Find the entropy of the source, avg. length of the code and efficiency. Also comment on difference between hu‘finan code and minirsum variance huffiman code. (b) Encode the following sequence using the LZ-77 aigorithm barrayarfbybbarrayarhbay. Assume you have 2 window size of 15 with look ahead buffer of size 7. Further more assume that o(a)=1, e(b)=2's-¢(B)=3 cQ)=4, e(y)F5. (a) Discuss the drawbacks of different coaventional method in audio compression. Explain silence compression in lossy audio compression technique. (b) Describe the format of 1 -law encoder and decoder specified by G711. Find out the codeword for - 656 input sample using — law encoder specified by G71 Give difference between j.- law and A law companding (a) Explain the attack on double DES. Discuss Triple DES with three keys and triple DES with two keys. (b) Explain steganography with example Distinguish between steganography and cryptography. (a) State Fermat's little theorem and Euler's theorem. ‘ind multiplicative inverse of following without using extended euclidean algorithm, (i) 8'mod 77 (i) T!mod 15, Also explain the use of Euler’s theorem in RSA eryptosystem. 100 20 20 0 20 {TURN OVER LM-Con.:8514-14, 6 QP Code :15372 (b) Explain digital signature using RSA with example. 20 (a) Write a short note on secure Electronic payment system, (b) Discuss Intruders, viruses and worms in detail Also explain logical bomb and trojan horse Given difference between viruses and worms, » Attempt any two: (a) IPRG in image compression (b) MPRG video standard (©) IDEA (@) Biometric Authentication LM-Con.:8514-14,

Das könnte Ihnen auch gefallen