IT2352 CRYPTOGRAPHY AND NETWORK SECURITY ANNA UNIVERSITY PREVIOUS YEAR QUESTION PAPER , APRIL/MAY 2011 QUESTION PAPER, MODEL ANNA UNIVERSITY QUESTION PAPER IMPORTANT QUESTIONS
IT2352 CRYPTOGRAPHY AND NETWORK SECURITY ANNA UNIVERSITY PREVIOUS YEAR QUESTION PAPER , APRIL/MAY 2011 QUESTION PAPER, MODEL ANNA UNIVERSITY QUESTION PAPER IMPORTANT QUESTIONS
2. What is the use of Fermat’s theorem?
3. What are the different modes of operation in DES?
4. Name any two methods for testing prime numbers.
5. What is discrete logarithm?
6. What do you mean by one-way property in hash function?
7. List out the requirements of Kerberos.
8. Mention four SSL protocols.
9. Define Intruder. Name three different classes of Intruders.
10. What do you mean by Trojan Horses?
PART B — (5 × 16 = 80 marks)
11. (a) Discuss the classical cryptosystems and its types. (16)
Or
(b) Describe Euler’s and Chinese Remainder theorem. (16)
12. (a) (i) Explain about the single round of DES algorithm. (10)
(ii) Describe key discarding process of DES. (6)
Or
(b) Explain RSA method in detail. (16)
13. (a) Discuss the discrete logarithm and explain Diffie-Hellman key Exchange
algorithm with its merits and demerits. (16)
Or
(b) Explain about MD5 in detail. (16)
14. (a) Write on the following :
(i) Differentiate SSL from SET. (8)
(ii) Overview of IP security documents. (8)
Or
(b) Explain PGP message generation and reception. (16)
15. (a) Explain definition, phases, types of virus structures and types of viruses.
(16)
Or
(b) Write in detail about definition, characteristics, types and limitations of
firewalls. (16)
IT2352 CRYPTOGRAPHY AND NETWORK SECURITY ANNA UNIVERSITY PREVIOUS YEAR QUESTION PAPER , APRIL/MAY 2011 QUESTION PAPER, MODEL ANNA UNIVERSITY QUESTION PAPER IMPORTANT QUESTIONS
B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2011
Sixth Semester
Information Technology
IT 2352 — CRYPTOGRAPHY AND NETWORK SECURITY
(Regulation 2008)
Time : Three hours Maximum : 100 marks
Answer ALL questions
PART A — (10 × 2 = 20 marks)
1. Differentiate passive attack from active attack with example.2. What is the use of Fermat’s theorem?
3. What are the different modes of operation in DES?
4. Name any two methods for testing prime numbers.
5. What is discrete logarithm?
6. What do you mean by one-way property in hash function?
7. List out the requirements of Kerberos.
8. Mention four SSL protocols.
9. Define Intruder. Name three different classes of Intruders.
10. What do you mean by Trojan Horses?
PART B — (5 × 16 = 80 marks)
11. (a) Discuss the classical cryptosystems and its types. (16)
Or
(b) Describe Euler’s and Chinese Remainder theorem. (16)
12. (a) (i) Explain about the single round of DES algorithm. (10)
(ii) Describe key discarding process of DES. (6)
Or
(b) Explain RSA method in detail. (16)
13. (a) Discuss the discrete logarithm and explain Diffie-Hellman key Exchange
algorithm with its merits and demerits. (16)
Or
(b) Explain about MD5 in detail. (16)
14. (a) Write on the following :
(i) Differentiate SSL from SET. (8)
(ii) Overview of IP security documents. (8)
Or
(b) Explain PGP message generation and reception. (16)
15. (a) Explain definition, phases, types of virus structures and types of viruses.
(16)
Or
(b) Write in detail about definition, characteristics, types and limitations of
firewalls. (16)