Thursday, April 24, 2014

SATHYABAMA UNIVERSITY B.E Electronics & Tele-Communication Engineering Cryptography 2011

Below is a question paper titled "Engineering Cryptography" for Sathyabama University B.E Electronics and Tele-communication Engineering. 2011 is the exam of this paper. If you or your frined in need of this question paper, then have a look at the below texts to get it and use it for your exam preparation.

Sathyabama University, B.E Tele-Communication Engineering Question Paper 2011

PART - A (10 x 2 = 20)
Answer ALL the Questions
1. The given cipher text is "ybpq lc irzh". Find the plain text when the key is "monoalphabetic cipher" with x = x+3.
2. State the difference between stegnography and cryptography.
3. What are the strengths of DES algorithm?
4. Find the GCD of "2740" and "1760" using Euclids algorithm.
5. Write down the principles behind RSAs secure model.
6. Which formula does the Elliptic curve system use to determine the relationship between public key and private keys within the universe created by an elliptic curve?
7. What is S/MIME?
8. How does IP security offer the authentication and confidentiality services?
9. List the classes of Intruders
10. What is IP address spoofing?

PART – B (5 x 12 = 60)
Answer All the Questions
11. Explain the basic model for network security.
(or)
12. Write short notes on
(a) Play fair
(b) Polyalphabetic ciphers
13. Describe the block cipher models of operation in detail.
(or)
14. Given 10 bit key K = 1010000010 determine K1K2 where
P10 = 3 5 2 7 4 10 1 9 8 6
P8 = 6 3 7 4 8 5 1 0 9
By using SDES key generation method.
15. Perform Encryption / Decryption using RSA algorithm for the following.
P = 3, q=11, e=7, m=5
(or)
16. Users A and B use the Diffie Hellman key exchange technique a common prime q = 11 and a primitive root alpha = 7
(a) if user A has private key XA=3, what is As public YA? (2)
(b) If user B has private key XB=6 what is Bs public key YB? (2)
(c) What is the shared secret key? Also write the algorithm (3)
(d) How can the man – in – middle attack be performed in the Diffie Hellman algorithm?
17. Describe the SSL specific protocol handshake action in detail.
(or)
18. Explain the function of Kerberos authentication server.
19. What are the demerits of not using firewall? List the design goals of firewall.
(or)
20. With circuit schematic explain packet filtering router type in firewall.   
Share This
Previous Post
Next Post

B.E Civil Engineer Graduated from Government College of Engineering Tirunelveli in the year 2016. She has developed this website for the welfare of students community not only for students under Anna University Chennai, but for all universities located in India. That's why her website is named as www.IndianUniversityQuestionPapers.com . If you don't find any study materials that you are looking for, you may intimate her through contact page of this website to know her so that it will be useful for providing them as early as possible. You can also share your own study materials and it can be published in this website after verification and reviewing. Thank you!

0 comments:

Pen down your valuable important comments below

Search Everything Here