• Like
  • Save
9 d57206b cryptography & network security
Upcoming SlideShare
Loading in...5
×
 

9 d57206b cryptography & network security

on

  • 377 views

Question papers for 2nd sem jntu anantapur students

Question papers for 2nd sem jntu anantapur students

Statistics

Views

Total Views
377
Views on SlideShare
268
Embed Views
109

Actions

Likes
0
Downloads
0
Comments
0

4 Embeds 109

http://vizonembedded.blogspot.in 89
http://vizonembeddedsolutions.blogspot.in 17
http://vizonembedded.blogspot.com 2
http://vizonembeddedsolutions.blogspot.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    9 d57206b cryptography & network security 9 d57206b cryptography & network security Document Transcript

    • JNTUW ORLD Code: 9D57206b M.Tech - II Semester Supplementary April/May 2012 Examinations (for students admitted in 2009- 10 & 2010-11 only) CRYPTOGRAPHY & NETWORK SECURITY (Common to VLSIS, VLSISD, VLSI & VLSID) Time: 3 hours Max. Marks: 60 Answer any FIVE Questions All Questions carry equal marks ***** 1. (a) What is a block cipher? List out supporting principles. Explain briefly data encryption standard. (b) Discuss the importance of key distribution in symmetric encryption. Explain the role of random numbers. 2. (a) Discuss the computational aspects of RSA with example. List out possible approaches to attack RSA. (b) Discuss the properties of hash functions. Explain its role in birthday attack. 3. (a) What problem was Kerberos designed to address? Discuss authentication dialogue format in various versions. (b) Discuss the fields of authentication header in IP security. List the key features of set. 4. (a) Discuss the terminology of malicious programs with example. (b) List the goals of firewalls. Explain different types. Discuss the advantages of trusted systems with examples. 5. Briefly discuss wireless LAN security factors issues. 6. (a) Explain attack taxonomy with example. (b) List out specific attack results explain data security. 7. (a) Discuss message digest algorithm with example. (b) Compare and contrast between conventional and modern encryption techniques. 8. (a) Discuss the components of hardening strategy. Explain supporting host operating systems. (b) Discuss the role of protocols in layer 2 security considerations. ***** www.jntuworld.com www.jntuworld.com www.jwjobs.net