Question Paper: Dot Net Technology : Question Paper Jun 2014 - Information Technology Engineering (Semester 6) | Gujarat Technological University (GTU)
0

Dot Net Technology - Jun 2014

Information Technology Engineering (Semester 6)

TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
1 (a) Explain various types of attack on computer system.(7 marks) 1 (b) What is security mechanism? List and explain various security mechanism.(7 marks) 2 (a) Explain the conventional security model used for information security.(7 marks) 2 (b) Explain cryptanalysis. Discuss any one technique for it.(7 marks) 2 (c) What attacks can be done on encrypted text? Explain them.(7 marks) 3 (a) Compare public key and private key cryptography. Also list various algorithms for each.(7 marks) 3 (b) With the help of example explain how can we find out GCD of two numbers using 07 Euclid algorithm.(7 marks) 3 (c) What is digital signature? Explain its use with the help of example.(7 marks) 3 (d) Explain play fair cipher with suitable example.(7 marks) 4 (a) Explain limitation of DES in detail.(7 marks) 4 (b) List and Explain various key management techniques.(7 marks) 4 (c) Explain RSA algorithm.(7 marks) 4 (d) How can we achieve web security? Explain with example.(7 marks)


Write a note on following (Any 4):

5 (a) Pretty Good Privacy.(4 marks) 5 (b) Kerberos.(4 marks) 5 (c) Hill cipher.(4 marks) 5 (d) Elliptic curve cryptography.(4 marks) 5 (e) Diffie-Hellman key exchange.(4 marks) 5 (f) Message Authentication code.(4 marks)

ADD COMMENTlink
modified 22 months ago by gravatar for gtuinfo.in gtuinfo.in10 written 2.1 years ago by gravatar for Team Ques10 Team Ques10410
Please log in to add an answer.