111 (1)

2
AGPCE/14-15/CSE ABHA GAIKWAD-PATIL COLLEGE OF ENGINEERING EIGHTH SEMESTER B.E COMPUTER SCIENCE & ENGINEERING Pre University Test C.S.S. TIME : THREE Hrs. MAX.MARKS 80 ___________________________________________________ __________ INSTRUCTION TO CANDIDATES: 1 Solve any THREE Questions from SECTION A & any THREE Questions from SECTION B. SECTION A Q1.a) Discuss any four substitution cipher encryption methods and list their merits and demerits. [6M] b) Explain simplified DES with example. [7M] Q2) a) Explain Diffie Hellman key Exchange in detail with an example[6M] b) State and explain the principles of public key cryptography. [7M] Q3) a) Explain RSA algorithm in detail with an example [6M] b) What are the principal ingredients of a public-key cryptosystem? [7M] Q4) a) What is a key distribution center? [6M] b) Compare MD5, SHA1 and RIPEMD-160 algorithm. [7M] Q5) a) What are the requirements for message authentication? [7M] b) Distinguish between direct and arbitrated digital signature? [7M] . SECTION B Q6.a) Define and explain Kerberos [6M]

description

imp

Transcript of 111 (1)

AGPCE/14-15/CSEABHA GAIKWAD-PATIL COLLEGE OF ENGINEERING EIGHTH SEMESTER B.E COMPUTER SCIENCE & ENGINEERING Pre University TestC.S.S.TIME : THREE Hrs.MAX.MARKS 80 _____________________________________________________________INSTRUCTION TO CANDIDATES:1 Solve any THREE Questions from SECTION A & any THREE Questions from SECTION B.

SECTION AQ1.a) Discuss any four substitution cipher encryption methods and list their merits and demerits. [6M] b) Explain simplified DES with example. [7M]

Q2) a) Explain Diffie Hellman key Exchange in detail with an example[6M]

b) State and explain the principles of public key cryptography. [7M] Q3) a) Explain RSA algorithm in detail with an example [6M]

b) What are the principal ingredients of a public-key cryptosystem?

[7M] Q4) a) What is a key distribution center? [6M]

b) Compare MD5, SHA1 and RIPEMD-160 algorithm. [7M]

Q5) a) What are the requirements for message authentication? [7M] b) Distinguish between direct and arbitrated digital signature? [7M] .

SECTION B

Q6.a) Define and explain Kerberos [6M]

b) Describe MD5 algorithm in detail. Compare its performance with SHA-1. [7M] Q7.a) Describe HMAC algorithm in detail. [6M] b) Explain the Digital Signature Algorithm in detail? [7M] Q8.) Explain IpSec in detail? [13M]

Q9.a) What are three benefits that can be provided by an intrusion detection system? [6M] b) List the steps involved in SSL record protocol? [7M] Q10.a) Explain in details firewall and describe any three types of firewall. [7M] b) Describe trusted system in detail. [7M]