Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

It 803a

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Name : ……………………………………………………………

htt
Roll No. : ……………………………………………..…………..
Invigilator's Signature : ………………………………………..

CS/B.TECH(IT)(SEPARATE SUPPLE)/SEM-8/IT-803A/2011
p:/
2011
DATA COMPRESSION AND CRYPTOGRAPHY
Time Allotted : 3 Hours Full Marks : 70
/q
The figures in the margin indicate full marks.
pap
Candidates are required to give their answers in their own words as
far as practicable.

GROUP – A
( Multiple Choice Type Questions )
er.

1. Choose the correct alternatives for the following :

10 × 1 = 10

i) Key size in IDEA is


wb

a) 56 bits b) 48 bits

c) 64 bits d) 128 bits.

ii) Key shifting is used in


ut .

a) DES b) IDEA

c) RSA d) None of these.


a c.

iii) Preoutput phase is acquainted with

a) DES b) IDEA

c) RSA d) MD5.
in

SS–234 [ Turn over


CS/B.TECH(IT)(SEPARATE SUPPLE)/SEM-8/IT-803A/2011

iv) Triple DES makes use of


htt
a) One key b) Two key

c) Three key d) Both (b) & (c).

v) An example of two-factor authentication is


p:/
a) Password b) Digital Certificate

c) Authentication d) Non Repudiation.


/q
vi) Digital Signature cannot ensure

a) Authentication b) Confidentiality
pap
c) Integrity d) Both (b) & (c).

vii) DMZ is used for

a) Public Server b) Private Server

c) Network Server d) Thread Server.


er.

viii) The statement "Best of Both World" is used for

a) Digital Envelope
wb

b) Diffie-Hallman key Exchange

c) IDEA

d) Electronic Envelope.
ut .

ix) Proof by property is an approach of

a) Confidentiality b) Authentication

c) Integrity d) Non Repudiation.


a c.

x) Zero/Blank Replacement is used for encoding

a) Single character b) Double character

c) Both (a) and (b) d) None of these.


in

SS–234 2
CS/B.TECH(IT)(SEPARATE SUPPLE)/SEM-8/IT-803A/2011

GROUP – B
htt
( Short Answer Type Questions )
Answer any three of the following. 3 × 5 = 15

2. What is Cryptography ? Discuss the principles of security.


p:/
1+4

3. Differentiate between Lossy and Lossless data compression.


/q
5

4. What is Data Compression ? Discuss Repetitive character


pap
encoding and Run length encoding. 1+4

5. Discuss Cipher Feedback ( CFB ) Mode of operation with


suitable diagram. 5

6. Differentiate between Confusion and Diffusion. State the


er.

attacks possible on RSA algorithm. 2+3

GROUP – C
wb

( Long Answer Type Questions )


Answer any three of the following. 3 × 15 = 45

7. What is Cryptology ? Discuss different types of Active


attacks ? State the steps of DES algorithm in detail
ut .

accompanied with suitable diagrams. 1+6+8

8. a) Discuss different Transposition techniques with


a c.

example. 5

b) State the requirements of Digital signature. 5

c) Differentiate between Certificate based and Biometrics


in

authentication. 5

SS–234 3 [ Turn over


CS/B.TECH(IT)(SEPARATE SUPPLE)/SEM-8/IT-803A/2011

9. a) Discuss different types of Firewall configuration. 6


htt
b) What is Firewall ? Discuss different types of Firewall.

1+5
p:/
c) Calculate 'd' in RSA algorithm for p = 7 and q = 17.
Hence state the public key and private key for the
algorithm. 3
/q
10. a) Discuss Run Length Encoding with suitable example.
Define Compression ratio. 5+1
pap
b) State the attacks possible on Packet Filtering router. 5

c) Differentiate between Huffman coding and Arithmetic


coding. 4

11. Write short note on any three of the following : 3 × 5 = 15


er.

a) IDEA

b) Attacks on RSA algorithm


wb

c) JPEG

d) Password
ut .

e) DNS Spoofing.
a c.
in

SS–234 4

You might also like