Save as PDF
Opens your browser print dialog — select "Save as PDF" to download.
Total No. of Questions 8
Total No of Printed Pages 1
Roll No
MCSE-302(C)
M.E./M.Tech., III Semester
Examination, December 2024
Network Security
(Elective-11)
Time: Three Hours
Maximum Marks: 70
Note: i) Attempt any five questions.
ii) All questions carry equal marks.
1. a)
With a neat block diagram, explain the network security model and the important parameters associated with it.
b)
What is significance digital signature? Describe the security services provided by the digital signature.
2. a)
Differentiate active and passive security attacks. Categorize these attacks and explain one examples of each.
b)
Explain different block cipher design principles.
3. a)
Describe RSA algorithm and estimate the encryption and decryption values for the RSA algorithm parameters.
b)
Draw the general structure of DES and describe how encryption and decryption are carried out and identify the strength of DES algorithm.
4. a)
Describe Diffie-Hellman key exchange technique with its pros and cons. Let Users A and B use a common prime q = 11 and a primitive root alpha = 7. Then If user A has private key XA = 3. What is A's public key YA? If user B has private key XB = 6. What is B's Public key YB?
b)
Briefly describe the idea behind Elliptic Curve Cryptosystem and describe the key management of public key.
5. a)
Describe Hash and Mac Algorithms. What are their significant applications.
b)
How message authentication is performed? Explain message Authentication Requirements and Authentication Functions.
6. a)
Define pigeonhole principle and birthday problem. Assume that message in a hash function are 6 bits long and the digest are only 4 bits long. Find out how many messages are corresponding to one message digest.
b)
What are cookies, spyware, virus, logic bomb, worms, ransomware and rootkit explain.
7. a)
Describe how IP security is executed and its functioning. Illustrate its necessity in current online atmosphere.
b)
Explain Viruses and Related Threats. Differentiate between Viruses and Worms
8.
Write short note on any two of the following:
a)
Firewall Design principles
b)
Differential and Linear Cryptanalysis
c)
Web Security