Admin Welcomes U ANNA UNIVERSITY IT SIXTH SEMESTER QUESTION BANKS FOR IT WITH SOLUTIONS ~ ANNA UNIVERSITY QUESTION BANKS PAPERS WITH SOLUTIONS

JOIN WITH US :)

If any add appear like this please click skip add

Category

INFO

CLICK HERE
FOR LATEST RESULTS
LATEST NEW TIME TABLE/EXAM DATES FOR ALL LINK1 LINK2
ANNA UNIVERSITY COLLEGES RANK LIST 2012 CHECK SOON
LATEST FREE PLACEMENT PAPERS FOR ALL COMPANIES CHECK SOON
GET FREE MINI PROJECTS AND FINAL YEAR PROJECTS CLICK HERE
LATEST HOT HACKING TRICKS CLICK HERE

LATEST QUESTION BANKS /PAPERS/entrance FOR ALL EXAMS CLICK HERE link1 link2




our sites
www.tricksnew.blogspot.com www.questionbank.tk
www.freeminiproject.blogspot.com and
www.onlineinfocity.
blogspot.com


NOTE:

FEEL FREE TO CONTACT US click on me
DONT FORGET TO SUBSCRIBE YOUR MAIL ID ----->>>TO GET DAILY question banks IN YOUR INBOX::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SEE RIGHT SIDE CORNER

Thursday, April 26, 2012

ANNA UNIVERSITY IT SIXTH SEMESTER QUESTION BANKS FOR IT WITH SOLUTIONS

INFORMATION TECHNOLOGY ANNA UNIVERSITY CHENNAI
ANNA UNIVERSITY SIXTH SEMESTER QUESTION BANKS FOR IT WITH SOLUTIONS
IT 2352 – CRYPTOGRAPHY AND NETWORK SECURITY 2MARKS AND 16 MARKS
PDF PPT DOC
B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2011.
Seventh Semester
Computer Science and Engineering
IT 2352 – CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Sixth Semester Information Technology)
(Regulation 2008)
Time : Three hours                                                    Maximum : 100 marks
Answer ALL questions.
PART A — (10 × 2 = 20 marks)

1. Give the types of attack.
2. List out the problems of one time pad?
3. Write down the purpose of the S-Boxes in DES?
4. Define : Diffusion.
5. Define: Replay attack.
6. List out the parameters of AES.
7. Define : Primality test.
8. State the difference between conventional encryption and public-key encryption.
9. Define : Malicious software.
10. Name any two security standards.


PART B — (5 × 16 = 80 marks)


11. (a) Using play fair cipher algorithm encrypt the message using the key ‘‘MONARCHY’’ and explain.
Or
(b) Explain the ceaser cipher and monoalphabetic cipher.


12. (a) Explain the Key Generation, Encryption and Decryption of SDES algorithm in detail.
Or
(b) Write the algorithm of RSA and explain with an example.


13. (a) Illustrate about the SHA algorithm and explain.


Or
(b) Write a detailed note on Digital signatures.


14. (a) Describe the SSL Architecture in detail.
Or
(b) List out the participants of SET system, and explain in detail.


15. (a) Explain the types of Intrustion Detection Systems.
Or
(b) Explain the different types of firewall and its configurations in detail.

0 comments:

chitika