Beruflich Dokumente
Kultur Dokumente
www.andhracolleges.com
1. Discuss in detail Simple-DES.
[16M]
[6M]
[5M]
[5M]
5. (a) In what order should the signature function and the confidentiality function
be applied to message, and why?
(b) What are some threats associated with a direct digital signature scheme? [8+8]
www.andhracolleges.com
7. (a) What are the basic approaches to building SAs?
(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What is difference between diffusion and confusion?
(b) What is it importance to study the Feistel cipher?
[16M]
www.andhracolleges.com
5. Define digital Signature. Explain its role in network security. [16M]
8. Write notes on
(a) Trapdoors
(b) Logic bomb
(c) Trojan horses [5+5+6]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16M]
www.andhracolleges.com
⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
1. Write short notes on :
(a) Avalanche effect
(b) Diffusion and confusion
(c) Steganography
(d) Caesar cipher
2. Explain the process of encryption and decryption in RC5 algorithm.
3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P)
[4M]
[4M]
[4M]
[4M]
[16M]
[6M]
(b) Consider a diffie-helman scheme with a common prime q=11 and a primitive
rootα=2
i. If user A has public key YA = 9, what is A’s private key XA ?
ii. If user B has public key YB = 3, what is the shared key K? [10M]
4. (a) State and prove Fermat’s theorem?
(b) State and prove Euler’s theorem?
(c) Using Fermat’s theorem, find 3201 mod 11.
www.andhracolleges.com
[5M+5M+6M]
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
6. (a) What problem was Kerberos designed to address?
(b) What are three threats associated with user authentication over a network or
Internet?
(c) List three approaches to secure user authentication over a network or Internet?
[4+4+8]
7. (a) What are the basic approaches to building SAs?
(b) What are the roles of the Oakley key determination protocol and ISAKMP in
IPSec? [6+10]
8. (a) List and briefly define four techniques used to avoid guessable password?
(b) In general terms, how does a worm propagate? [8+8]
⋆⋆⋆⋆⋆
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
1 ofUSA-UK-Australia-Germany-France-NewZealand
1 Universities List