NSC 2007
NSC 2007
www.andhracolleges.com
1. (a) What are two general approaches to attacking a cipher?
(b) What is the difference between an unconditionally secure cipher and a com-
putationally secure cipher?
(b) Perform encryption and decryption using RSA algorithm for the following
i. p= 3, q=11,d=7, M=5
[8M]
[16M]
[8M]
5. (a) Is it necessary to recover the secret key in order to attack a MAC algorithm?
(b) What characteristics are needed in a secure hash function? [8+8]
www.andhracolleges.com
(b) What are three threats associated with user authentication over a network or
Internet?
(c) List three approaches to secure user authentication over a network or Internet?
[4+4+8]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16M]
8. Write notes on
(a) Viruses
www.andhracolleges.com
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List
www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis.
[8M]
[8M]
[8M]
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
www.andhracolleges.com
6. (a) Discuss cryptographic algorithms used in S/MIME
(b) List limitations of SMTP/822 scheme? [8+8]
8. Write notes on
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis.
[6M]
[5M]
[5M]
4. (a) If p and q are two prime numbers ,with p6= q and n=pq
Prove that Φ(n)= Φ(pq)=(p-1)(q-1).
(b) Determine Φ(37) and Φ(35). [10+6]
www.andhracolleges.com
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
⋆⋆⋆⋆⋆