Beruflich Dokumente
Kultur Dokumente
Eighth Semester B.E. Electronics & Commn. Engg. Examinations May - June 2014
Cryptography and Network Security
Time: 3 Hours Max. Marks: 100
Not : 1. Question No. 1 is Compulsory
e
2. Answer any 4 full questions from question No. 2 to Question No. 6
-2- ECEL26
b) Explain the RSA algorithm with key generation and an example for encryption and 8
decryption for P=17, q=11 and generate the public key and private key.
c) Define Hash function and show that how authentication and confidentiality both can be
achieved using Hash function. 6
5 a) Explain with a neat figure the digital signature standard (DSS) algorithm. Show how the DSS
signing and verifying is achieved. 7
b) Explain the procedures for UNIX password generation scheme to achieve password
protection from intruders. 7
c) Write notes on any one of the following.
i) Authentication protocols ii) Different approaches for digital signatures
iii) Web security approaches iv) Alert protocol v) SET procedure. 6
6 a) What are the two categories of malicious program? Explain each category with an example. 6
b) Explain the functioning of digital immune system for virus counter measures. Define the role
of blocking software. 6
c) Describe the three firewall configuration with a neat diagram. 8
________