Professional Documents
Culture Documents
a) Define public key cryptography and explain RSA algorithm b) In RSA algorithm, if p=17, q=7 and d=5, then find e UNIT-IV 7. a) Define Authentication and digital signatures b) Explain HMAC algorithm OR 8. a) Explain MD5 algorithm b) Compare MD5 with SHA-1 algorithm UNIT-V 9. a) Differentiate PGP and PEM b) Explain x.509 directory authentication service OR 10. a) Explain Kerberos in detail b) What are the goals of firewalls and explain the different types 8 4 6 6 8 4 6 6 8 4
[3,7/VII S/110]
[EURCS/EURIT-703]
UNIT-I 1. a) Explain the classical encryption techniques b) Explain the fiestel proof of Data Encryption standard algorithm OR 2. a) Explain cipher block chaining mode and cipher block feed back mode. b) What is the impact of bit error and bit timing error in the above modes? UNIT-II 3. a) Explain Triple DES b) Explain Rijndael logic of AES OR 4. a) Explain RC4 in detail b) Write about Random number generation UNIT-III 5. a) Explain Diffie-Hellman Key exchange algorithm b) Explain man-in-the-middle attack 4 8 8 4 4 8
8 4 4 8
OR 6. a) Define public key cryptography and explain RSA algorithm b) In RSA algorithm, if p=17, q=7 and d=5, then find e UNIT-IV 7. a) Define Authentication and digital signatures b) Explain HMAC algorithm OR 8. a) Explain MD5 algorithm b) Compare MD5 with SHA-1 algorithm UNIT-V 9. a) Differentiate PGP and PEM b) Explain x.509 directory authentication service OR 10. a) Explain Kerberos in detail b) What are the goals of firewalls and explain the different types 8 4 6 6 8 4 6 6 8 4
[3,7/VII S/110]
[EURCS/EURIT-703]
UNIT-I 1. a) Explain the classical encryption techniques b) Explain the fiestel proof of Data Encryption standard algorithm OR 2. a) Explain cipher block chaining mode and cipher block feed back mode. b) What is the impact of bit error and bit timing error in the above modes? UNIT-II 3. a) Explain Triple DES b) Explain Rijndael logic of AES OR 4. a) Explain RC4 in detail b) Write about Random number generation UNIT-III 5. a) Explain Diffie-Hellman Key exchange algorithm b) Explain man-in-the-middle attack 4 8 8 4 4 8
8 4 4 8