0
1.3kviews
Data Compression and Encryption* Question Paper - May 18 - Electronics And Telecomm (Semester 7) - Mumbai University (MU)
1 Answer
0
8views

Data Compression and Encryption* - May 18

Electronics And Telecomm (Semester 7)

Total marks: 80
Total time: 3 Hours
INSTRUCTIONS
(1) Question No. 1 is compulsory.
(2) Attempt any three from remaining five questions.

1(a) Discuss the concept of LZ78 with an example.
(5 marks) 1025

1(b) What is motion estimation? How is it useful for video compression?
(5 marks) 1036

1(c) Define Euler's totient function. Compute $\phi$(37),$\phi$(49),$\phi$(100).
(5 marks) 1048

1(d) Define hash function and state its properties.
(5 marks) 1059

2(a) Consider a source with symbols = {m, n, o, p) with corresponding probabilities {0.4, 0.3, 0.1, 0.2). Using arithmetic coding, determine the output tag for the message "monop". Also, reconstruct the message using this tag.

(10 marks) 1011

2(b) Draw and explain the working of AES encryption algorithm.
(10 marks) 1045

3(a) Using RSA algorithm, user X chooses the public key (n=21, e = 5). Compute the private key d of user X. User Y wants to transmit message M=19 to user X in a confidential manner using RSA algorithm, determine the cipher text C.
(10 marks) 1054

3(b) Draw and explain the working of JPEG image compression standard.
(10 marks) 1032

4(a) Discuss the concept of $\mu$-law companding. Using $\mu$-law companding, determine the encoded output value for an input audio sample with value (+358). Also, reconstruct to determine the decoded value.
(10 marks) 1028

4(b) What is Certificate Authority? How is a digital certificate obtained and verified?
(10 marks) 00

5(a) What is Intrusion Detection System? Discuss the different techniques of implementing it.
(10 marks) 00

5(b) Solve the linear congruent equation for x: 232x + 42 = 48 mod 50.
(5 marks) 00

5(c) How is the accumulation of error avoided when using DPCM for image compression?
(5 marks) 1031

6(a) Draw and explain the working of Key Distribution Center for exchanging secret keys.
(10 marks) 00

6(b) Compare statistical and dictionary compression techniques.
(5 marks) 00

6(c) What is a one-way trapdoor function? List three one-way trapdoor functions used in cryptography.
(5 marks) 00

Please log in to add an answer.