2020 2021 Student Forum Anna University B.Tech IT 6th sem question paper

#1
11th December 2014, 01:41 PM
 Unregistered Guest
Anna University B.Tech IT 6th sem question paper

Hi I want the question paper of Web Technology of B.Tech IT 6th semester of Anna University?
#2
11th December 2014, 02:33 PM
 Super Moderator Join Date: Apr 2013
Re: Anna University B.Tech IT 6th sem question paper

Hi, as you want the question paper of Web Technology of B.Tech IT 6th semester of Anna University so here I am providing you

B.Tech IT 6th sem Web Technology question paper

IT 1352 - Cryptography And Network Security

PART A -(10*2=20 marks)

1.What is avalanche effect?

2.What are the types of attacks on encrypted message?

3.Find gcd(56,86) using Euclid's Algorithm.

4.Why Elliptic Curve Cryptography is considered to be better than RSA?

6.Define weak collision property of a hash function.

7.What is x.509 standard?

8.Give IPSEC ESP format.

9.What are honey pots?

10.List down the four phases of virus.

PART B - (5*16=80 marks)

11. (a) Discuss in detail encryption and decryption process of AES. [16]

(OR)

(b)(i) Briefly explain design principles of block cipher. [8]
(ii)Discuss in detail block cipher modes of operation. [8]

12. (a)(i) Discuss in detail RSA algorithm,highlighting its computational aspects and security. [10]
(ii)Perform decryption and encryption using RSA algorithm with p=3;q=11;e=7 and N=5. [6]

(OR)

(b) Briefly explain Diffie Hellman Key exchange with an example. [16]

13. (a)(i) Explain authentication functions in detail. [10]
(ii)What is meant by message digest? Give an example. [6]

(OR)

(b)(i) Briefly explain Digital Signature algorithm [8]
(ii)Discuss clearly Secure Hash Algorithm [8]

14. (a)(i) What is kerberos? Explain how it provides authenticated service? [12]
(ii)Explain the architecture of IPSEC. [4]

(OR)

(b)(i) Explain handshake protocol actions of SSL. [4]
(ii)Discuss in detail secure electronic transaction.[12]

15. (a)
(i) Explain firewalls and how they prevent intrusions. [12]
(ii)Explain the concept of reference monitor. [4]

(OR)

(b)
(i) Define intrusion detection and the different types of detection mechanisms in detail. [10]
(ii)Comment on password selection strategies and their significance. [6]

Contact details

Anna University
Kotturpuram, Chennai,
044 6450 2506

Map location

Message:
Options