Professional Documents
Culture Documents
1
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
5. (a) Is it necessary to recover the secret key in order to attack a MAC algorithm?
(b) What characteristics are needed in a secure hash function? [8+8]
⋆⋆⋆⋆⋆
1 of 1
Code No: RR410504 Set No. 2
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
1 of 2
Code No: RR410504 Set No. 2
7. Write a short note on
8. Write notes on
(a) Viruses
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR410504 Set No. 3
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis. [8M]
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
8. Write notes on
⋆⋆⋆⋆⋆
1 of 1
Code No: RR410504 Set No. 4
IV B.Tech I Semester Supplementary Examinations, February 2007
NETWORK SECURITY AND CRYPTOGRAPHY
(Computer Science & Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis. [8M]
4. (a) If p and q are two prime numbers ,with p6= q and n=pq
Prove that Φ(n)= Φ(pq)=(p-1)(q-1).
(b) Determine Φ(37) and Φ(35). [10+6]
8. Write notes on
⋆⋆⋆⋆⋆
1 of 1