Exam Details
Subject | Cryptography And Network Security | |
Paper | ||
Exam / Course | B.Tech In Computer Science And Engineering (BTCSVI) | |
Department | School of Engineering & Technology (SOET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
No. of Printed Pages: 2 IBICSE·OI6J
B.Tech. -VIEP -COMPUTER SCIENCE AND
ENGINEERING (BTCSVI)
Term-End Examination
June, 2016
U0746
HICSE-O16 CRYPTOGRAPHY AND NETWORK SECURITY
Time hours Maximum Marks: 70
Note: Attempt any five questions. Each question carries equal marks.
1. Explain the concept of Feistel Encryption and Decryption algorithms. 14
2. What is meant by message authentication Explain the functions of authentication in detail. 14
3. Explain key generation, encryption and decryption in the RSA algorithm. 14
4. How is double DES achieved? Under what condition is the above reduced to single encryption 14
5. What is the difficulty posed to an opponent when Diffie-Hellman key exchange algorithm is used in public key cryptography Show necessary steps in support of your answer. 14
6. How does symmetric key cryptography and asymmetric key cryptography get used in digital signatures? 14
7. Describe about SHA algorithm and compare its features with MD5. 7
Discuss in detail about Diffie-Hellman key exchange algorithm with the help of an example. 7
B.Tech. -VIEP -COMPUTER SCIENCE AND
ENGINEERING (BTCSVI)
Term-End Examination
June, 2016
U0746
HICSE-O16 CRYPTOGRAPHY AND NETWORK SECURITY
Time hours Maximum Marks: 70
Note: Attempt any five questions. Each question carries equal marks.
1. Explain the concept of Feistel Encryption and Decryption algorithms. 14
2. What is meant by message authentication Explain the functions of authentication in detail. 14
3. Explain key generation, encryption and decryption in the RSA algorithm. 14
4. How is double DES achieved? Under what condition is the above reduced to single encryption 14
5. What is the difficulty posed to an opponent when Diffie-Hellman key exchange algorithm is used in public key cryptography Show necessary steps in support of your answer. 14
6. How does symmetric key cryptography and asymmetric key cryptography get used in digital signatures? 14
7. Describe about SHA algorithm and compare its features with MD5. 7
Discuss in detail about Diffie-Hellman key exchange algorithm with the help of an example. 7
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Advanced Computer Architecture
- Artificial Intelligence
- Computer Architecture
- Computer Networks
- Computer Organisations
- Cryptography And Network Security
- Data Structure
- Data Warehousing And Mining
- Database Management System
- Design and Analysis of Algorithm
- Digital Image Processing
- Discrete Maths Structure
- E-Business
- Formal Language And Automata
- Logic Design
- Microprocessor
- Mobile Computing
- Object Oriented Programming
- Operating Systems
- Parallel Algorithms
- Pattern Recognition
- Principles of Programming Lang.
- Real Time Systems
- Software Engineering
- Software Quality Engineering
- Software Reusability
- System Programming And Compiler Design
- Theory Of Computation
- Unix Internals And Shell Programming
- Web Technology