Blogger Widgets

anna university notes , question paper..click here nxstud

Friday, 17 February 2012

IT 1352- CRYPTOGRAPHY AND NETWORK SECURITY PREVIOUS YEAR QUESTION PAPER and Notes


CRYPTOGRAPHY AND NETWORK SECURITY IT2352 CNS





IT 1352- CRYPTOGRAPHY AND NETWORK SECURITY ANNA UNIVERSITY PREVIOUS YEAR QUESTION BANK  



B.E/B.Tech DEGREE EXAMINATION, NOV/DEC 2009
IT 1352- CRYPTOGRAPHY AND NETWORK SECURITY

Part A

1.What is cryptanalysis and cryptography?
2.Define threat and attack.
What is the role of session key in public key schemes?
4.What is a zero point of an elliptic curve?
5.What are the functions used to produce an authenticator?
6.List the properties a digital signature should possess?
7.Mention the scenario where kerberos scheme is preferred.
8.What are the technical deficiencies in the kerberos version 4 protocol?
9.List the classes of intruders.
10.Give the types of viruses.

Part B

11.(a).Explain the OSI security architecture along with the services available.
(Or)
11.(b).(i).Given 10 bit key K=1010000010. Determine K1,k2 where
P10=3 5 2 7 4 10 1 9 8 6
P8= 6 3 7 4 8 5 10 9
by using SDES key generation method.

12.(a).(i).Perform Encryption/Decryption using RSA algorithm for the following:
p=3, q=11, e=7, m=5
(ii).What attacks are possible on RSA algorithm?
(Or)
12.(b).(i).Given the key 'MONARCHY' apply play fair to plain text "FACTIONALISM" to ensure confidentiality
at the destination, decrypt the ciphertext and establish authenticity.
(ii).Apply public key encryption to establish confidentiality in the message from A to B.
You are given m=67, KU={7,187}, KR={23,187}

13.(a).(i).Apply the MAC on the cryptographic checksum method to authenticate build confidentiality of the
message where the authentication is tied to message.
M=8376, K1=4892, K2=53624071
(ii).What are the properties a hash function must satisfy?
(Or)
13.(b).Explain MD5 message digest algorithm, with it's logic and compression function.

14.(a).Explain X.509 authentication service and it's certificates.
(Or)
14.(b).(i).Explain the services of PGP.
(ii).Write down the functions provided by S/MIME.

15.(a).(i).List the approaches for the intrusion detection.
(ii).Eplain firewall design principles, characteristics and types of firewalls.
(Or)
15.(b).(i).Give the basic techniques which are in use for the password selection strategies.
(ii).Write down the four generations of antivirus software.

All Five unit notes 


click here !





No comments:

Post a Comment