HT TP: //qpa Pe R.W But .Ac .In: Data Compression & Cryptography
HT TP: //qpa Pe R.W But .Ac .In: Data Compression & Cryptography
HT TP: //qpa Pe R.W But .Ac .In: Data Compression & Cryptography
htt
Roll No. : ………………………………………………………..
Invigilator’s Signature : ………………………………………..
CS/B.TECH/IT/SEM-8/IT-803A/2013
p:/
2013
DATA COMPRESSION & CRYPTOGRAPHY
Time Allotted : 3 Hours Full Marks : 70
/q
The figures in the margin indicate full marks.
pap
Candidates are required to give their answers in their own words
as far as practicable.
er.
GROUP – A
( Multiple Choice Type Questions )
10 1 = 10
a) confidentiality b) authentication
a) interception b) fabrication
c) modification d) interruption.
in
b) Transposition Cipher
p:/
c) substitution as well as Transposition Cipher
/q
d) none of these.
d) none of these
wb
string is
ut .
a) always highest
b) always lowest
a c.
c) may be highest
d) none of these.
in
8308 2
CS/B.TECH/IT/SEM-8/IT-803A/2013
b) Arithmetic coding
p:/
c) Zero blank encoding
d) Message digest.
/q
vii) Digital signature is meant for
a) Authentication
pap
b) Confidentiality
c) Integrity
d) all of these.
er.
a) Sniffing b) Spoofing
a) X.503 b) X.508
c) X.509 d) X.505.
ut .
c) block cipher
c) 64 bits d) 8 bits.
p:/
xii) If A and B want to communicate securely with each
other, B must not know
GROUP – B
( Short Answer Type Questions )
Answer any three of the following. 3 5 = 15
er.
computationally secure ? 2
8308 4
CS/B.TECH/IT/SEM-8/IT-803A/2013
GROUP – C
htt
( Long Answer Type Questions )
Answer any three of the following. 3 15 = 45
Assuming that the 7-bit ASCII codes are used for data
pap
coding ? 2
er.
3+2
p:/
b) An audio signal is encoded with 256 levels. In using
DPCM, it is assumed that the maximum difference
between successive samples can be only to 8 levels of
/q
the sampling scheme. Calculate the theoretical
maximum compression that can be obtained with the
pap
DPCM in terms of compression ratio. 2
i) Compander
8308 6
CS/B.TECH/IT/SEM-8/IT-803A/2013
b) Fractal compression
p:/
c) Biometric Authentication
d) Triple DES
/q
e) Discrete Cosine Transform ( DCT )
pap
f) IP Spoofing.
er.
wb
ut .
a c.
in