SlideShare a Scribd company logo
1 of 1
Download to read offline
JNTUW
ORLD
Code No: D6108, D3808, D7008, D5510, D6508
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M.Tech II - Semester Examinations, March/April 2011
NETWORK SECURITY AND CRYPTOGRAPHY
(COMMON TO COMMUNICATION SYSTEMS, DIGITAL ELECTRONICS &
COMMUNICATION SYSTEMS, ELECTRONICS & COMMUNICATION, EMBEDDED
SYSTEMS, WIRELESS & MOBILE COMMUNICATIONS)
Time: 3hours Max. Marks: 60
Answer any five questions
All questions carry equal marks
- - -
1. a. Distinguish between cryptography and steganography.
b. Explain the security services?
c. Describe the Internet work security model. [12]
2. Explain the working of RC5 algorithm. [12]
3. a. Explain the characteristics of advanced symmetric block ciphers.
b. Discuss the block cipher modes of operation. [12]
4. a. Explain the different approaches of key management in public key cryptography.
b. How the keys are exchanged using Diffie-Hellman key exchange algorithm? Explain.
[12]
5. a. Discuss about discrete logarithms.
b. Explain the security of hash functions and MACs. [12]
6. List and explain the sequence of steps followed in RIPEMD – 160 algorithm. [12]
7. a. Explain the operation of Kerberoes.
b. Explain S/MIME. [12]
8. Write short notes on:
a.Secure electronic transaction(SET)
b. Viruses and related threats [12]
*****
R09
www.jntuworld.com
www.jntuworld.com

More Related Content

More from అనిల్ జూలూరి (14)

R09 operations research
R09 operations  researchR09 operations  research
R09 operations research
 
R09 low power vlsi design
R09 low power vlsi designR09 low power vlsi design
R09 low power vlsi design
 
R09 instrumentation
R09 instrumentationR09 instrumentation
R09 instrumentation
 
R09 information security – ii
R09 information security – iiR09 information security – ii
R09 information security – ii
 
R09 information retrieval systems
R09 information retrieval systemsR09 information retrieval systems
R09 information retrieval systems
 
R09 genetic engineering
R09 genetic engineeringR09 genetic engineering
R09 genetic engineering
 
R09 flexible ac transmission systems
R09 flexible ac transmission systemsR09 flexible ac transmission systems
R09 flexible ac transmission systems
 
R09 dynamics of electric machines
R09 dynamics of electric machinesR09 dynamics of electric machines
R09 dynamics of electric machines
 
R09 downstream processing
R09 downstream processingR09 downstream processing
R09 downstream processing
 
R09 distributed computing
R09 distributed computingR09 distributed computing
R09 distributed computing
 
R09 design of fault tolerant systems
R09 design of fault tolerant systemsR09 design of fault tolerant systems
R09 design of fault tolerant systems
 
R09 advanced power system protection
R09 advanced power system protectionR09 advanced power system protection
R09 advanced power system protection
 
R09 adaptive control theory
R09 adaptive control theoryR09 adaptive control theory
R09 adaptive control theory
 
Nr r09-power quality
Nr r09-power qualityNr r09-power quality
Nr r09-power quality
 

R09 network security and cryptography

  • 1. JNTUW ORLD Code No: D6108, D3808, D7008, D5510, D6508 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M.Tech II - Semester Examinations, March/April 2011 NETWORK SECURITY AND CRYPTOGRAPHY (COMMON TO COMMUNICATION SYSTEMS, DIGITAL ELECTRONICS & COMMUNICATION SYSTEMS, ELECTRONICS & COMMUNICATION, EMBEDDED SYSTEMS, WIRELESS & MOBILE COMMUNICATIONS) Time: 3hours Max. Marks: 60 Answer any five questions All questions carry equal marks - - - 1. a. Distinguish between cryptography and steganography. b. Explain the security services? c. Describe the Internet work security model. [12] 2. Explain the working of RC5 algorithm. [12] 3. a. Explain the characteristics of advanced symmetric block ciphers. b. Discuss the block cipher modes of operation. [12] 4. a. Explain the different approaches of key management in public key cryptography. b. How the keys are exchanged using Diffie-Hellman key exchange algorithm? Explain. [12] 5. a. Discuss about discrete logarithms. b. Explain the security of hash functions and MACs. [12] 6. List and explain the sequence of steps followed in RIPEMD – 160 algorithm. [12] 7. a. Explain the operation of Kerberoes. b. Explain S/MIME. [12] 8. Write short notes on: a.Secure electronic transaction(SET) b. Viruses and related threats [12] ***** R09 www.jntuworld.com www.jntuworld.com