College : Vardhaman College Of Engineering
Degree : B.Tech
Department :Computer Science & Engineering
Semester : VI
Subject : Network Security & Cryptography
Document type : Question Paper
Website : https://vardhaman.org/
Download Previous / Old Question Papers :
May- 2014 :https://www.pdfquestion.in/uploads/vardhaman.org/6400-BT6RMAY14.pdf
Vardhaman Network Security & Cryptography Question Paper
Four Year B. Tech VI Semester Regular Examinations June – 2014
(Regulations: VCE-R11)
(Computer Science and Engineering)
Date: 8 June, 2014
Time: 3 hours
Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks
Related : Vardhaman College Of Engineering Wireless & Mobile Computing B.Tech Question Paper : www.pdfquestion.in/6399.html
All parts of the question must be answered in one place only :
Unit – I
1. a) With a neat diagram explain a model for Network security. 7M
b) Differentiate between Transposition Cipher and Substitution Cipher. Apply two stage transposition cipher on the text “treat diagrams as single units” using the keyword “sequence”. 8M
2. a) What is Steganography? Briefly explain any three techniques used. 7M
b) Encrypt the word “Semester Result” with the keyword “Examination” using Playfair Cipher. List the rules used. 8M
Unit – II
3. a) With a neat diagram, describe Classical Feistel Cipher structure. 7M
b) Explain the different Cipher block modes of operation. 8M
4. a) Explain the following:
i. Differential Cryptanalysis
ii. Linear Cryptanalysis 7M
b) Explain the RC4 algorithm. 8M
Unit – III
5. a) Discuss the Diffie-Hellman Key Exchange mechanism. 7M
b) With a neat diagram discuss the ingredients of a Public Key Cryptosystem. 8M
6. a) With a neat diagram discuss the essential elements of a Digital Signature Process 7M
b) Write the RSA algorithm for Encryption and Decryption. Given p=3, q=11, e=7 & m=5,perform RSA encryption and decryption. 8M
Unit – IV
7. a) Describe the structure of Private and Public key rings used in PGP. 7M
b) Discuss Transport mode and Tunnel modes of using IPSec Encapsulating security payload. services. 8M
8. a) Describe the following with respect to Kerberos Version. 4:
i. Authentication Server
ii. Ticket Granting Server 8M
b) Briefly discuss the benefits of IPSec. Also list ant four IPSec services. 7M
Unit – V
9. a) What are the components of a Virus? Discuss the four phases in the life time of a virus? 7M
b) What is a Firewall? Discuss any three types of Firewall? 8M
10. a) What are the objectives of SET? What do you understand by a dual signature that is used in SET? 7M
b) Discuss the following with respect to SSL Architecture:
i. SSL session
ii. SSL Connection 8M
C#AND.NET Framework
(Common to Computer Science Engineering & Information Technology)
Date: 5 June, 2014
Time: 3 hours
Max Marks: 75
Answer ONE question from each Unit
All Questions Carry Equal Marks
All parts of the question must be answered in one place only :
Unit – I :
1. a) Describe the three building blocks of .Net platform. 7M
b) What is Common Type System? Explain different types defined by the CTS in their language of choice. 8M
2. a) CLS rules apply only to those parts of a type that are exposed outside the defining assembly – Give inference with a suitable example. 8M
b) List the productivity enhancements provided by SharpDevelop. 7M
Unit – II :
3. a) Describe Boxing and Unboxing with suitable examples. 7M
b) Write a C# program to find the minimum and maximum element of an array. The array should have both positive and negative elements. Irrespective of the elements, your program should find maximum number when all numbers are made positive and minimum number when all numbers are made negative. 8M
4. a) Write a C# program that determines a student’s grade. The program will read three types of scores (quiz score, mid-term score, and final score) and determine the grade based on the following rules:
i. If the average score >=90% =>grade=A
ii. If the average score >= 70% and <90% => grade=B
iii. If the average score>=50% and <70% =>grade=C
iv. If the average score<50% =>grade=F 8M
b) Explain the method parameters keywords in C# namely “ref” and “out” with suitable examples. 7M
Unit – III :
5. a) Illustrate the concept of containment/delegation model with an example. 7M
b) Explain different Exception class members that can be useful in further qualifying the nature of the problem with an example for each? 8M
6. a) What is a shadowing member in C# programming? Illustrate the shadowing member by taking an example. 8M
b) Illustrate how multiple exceptions are handled in C# programming with an example. 7M