File - Sandeep Kumar Dubey,M.tech

advertisement
B. N. COLLEGE OF ENGINEERING & TECHNOLOGY,
LUCKNOW
Printed Page : 3
SET[A]
ECS-084
(Following paper ID and Roll No. to be filled in your Answer Book)
Roll No.
PAPER ID : 2870
B. Tech. (CSE)
VIIIth Semester MOCK Examination 2012-13
Cryptography and Network Security
TIME:3 Hours]
Note:
1.
[Total MARKS: 100
Attempt all questions.
Attempt any four parts of the following:
5x4=20
a) Draw the block diagram of DES cipher showing size of input output
every block. How important is swapping step at the end of every
round.
b) Show encryption technique of polyalphabetic? Compare its strength
with that of monoalphabetic cipher?
c) Describe the output Feedback (CFB) mode of a block cipher. if a bit
error occurs in the transmission of a cipher text characters in a 8-bit
CFB mode, how far does the error propagate?
d) What is a Transposition Cipher? Hill cipher is vulnerable to chosen
plain text.
e) Apply Hill cipher on following
Key:
3
7
2
8
Plaintext:
GOOD LUCK
f) Write short notes
(i)
Cryptography and Steganography
(ii)
Confusion and Diffusion
1
[Contd…
Q2. Attempt any FOUR parts of the following:
5x4=20
a) i) Define the Chinese Remainder Theorem and its Applications. Find
the value of x for the following sets of congruence using the Chinese
remainder theorem: x≡1mod 5,and x≡5mod 8
ii) Briefly define group, ring and field.
b) Find all Primitive roots of 19.
c) In a Diffie –Hellman key exchange algorithm, let the prime number
be353 and one of its primitive root be 3 and let A and B select their
secrete keys XA=97 and XB=233. Compute public key of A and B
and common secret key.
d) In RSA cryptosystem, given that modulus n is 100and public key e
is 13, obtain the value of d and private key.
e) Explain Euclid algorithm find gcd of 1970and 1066 by using Euclid
algorithm. Is the two numbers are relatively prime or not?
f) (i)If every element of a group G is its own inverse then G is
commutative , Prove
(ii) Describe primality testing. Test whether 221 is prime or not by
using this test.
Q3.Attempt any TWO parts of the following:
10x2=20
a) i) Compare the Security of hash function and Message
authentication code Brute force attack and Cryptanalysis.
ii) Determine the multiplicative inverse of1421 mod 6421 using
extended Euclid’s algorithm.
b) Write short notes on following:
i) Hash Code and MAC
(Difference)
ii) Weak Collision and Strong Collision
iii) Elgamal Digital Signature
c) Explain Digital signature with diagram and write algorithm for
signature generation and verification.
2
[Contd…
Q4. Attempt any TWO parts of the following:
10x2=20
a) In context of PGP answer the following :
i)What is the structure of public key ring and private key ring?
ii) What is pass phase?
iii) Signature is generated before compression and encryption is
applied after compression?
b) Write short notes on ANY THREE
(i) X.509(certificate and CRL)
(ii) Oakley algorithm
(iii) S/MIME
(iv) PUBLIC KEY INFRASTRUCTURE
c) What are the entities that institutes Kerberos environment? Write
down the message exchange for obtaining ticket-granting ticket and
service granting ticket in context of Kerberos version 4.Give the
justification behind choice of version elements of the message.
Q5. Attempt any TWO parts of the following:
10x2=20
a) Why is SSL layer positioned between the application layer and the
transport layer? Discuss the following sub-protocols of SSL:
i) Handshake protocol
ii) Record protocol
iii) Alert protocol
b) (i) What are the typical phases of an operation of a virus or worm
and how does behavior blocking S/W work ?
(ii) Explain the concept of tunnel and transport mode in SA and
authentication header
c) Write short notes on the following:
(i) Malicious Software
(ii) SET Environment
(iii) Intrusion detection
3
B. N. COLLEGE OF ENGINEERING & TECHNOLOGY,
LUCKNOW
Printed Page : 3
SET[B]
ECS-084
(Following paper ID and Roll No. to be filled in your Answer Book)
Roll No.
PAPER ID : 2870
VIII
th
B. Tech. (CSE)
Semester MOCK Examination 2012-13
Cryptography and Network Security
TIME:3 Hours]
Note:
1.
[Total MARKS: 100
Attempt all questions.
Attempt any four parts of the following:
5x4=20
a) What is DES? Explain the term Meet- in-middle Attack.
b) What is polyalphabetic cipher? Compare its strength with that of
monoalphabetic cipher?
c) Describe the output Feedback (CFB)mode of a block cipher. if a bit
error occurs in the transmission of a cipher text characters in a 8-bit
CFB mode, how far does the error propagate?
d) Define the 3 security goals. Distinguish b/w Passive attack and
Active Attack with Suitable Examples.
e) Apply Hill cipher on following
Key:
2
7
3
8
Plaintext:
NO ANSWER
f) Write short notes
(i)
Security attacks
(ii)
Steganography
OR
Write short notes on Shannon’s theory of confusion and diffusion.
1
[Contd…
Q2. Attempt any FOUR parts of the following:
5x4=20
a) Define the Chinese Remainder Theorem and its Applications. Find
the value of x for the following sets of congruence using the Chinese
remainder theorem:
(i)
x≡4mod 7,and x≡3mod 9
(ii)
x≡5mod 6,and x≡10mod 11
b) Find all Primitive roots of 29.
c) Explain Diffie-hellman key exchange algorithm. What is elliptic
curve?
d) In RSA , given that p=7 and q=13 , e=5, obtain the value of d and
using algorithm in detail.
e) Why we use Euclidean Algorithm and find gcd(1547,560)
f) (i)If every element of a group G is its own inverse then G is
commutative , Prove
(ii) Explain miller- rabin test for primality using algorithm.
Q3.Attempt any TWO parts of the following:
10x2=20
a) (i) Discuss at least one approach that can be used to launch a
Birthday attack on a message authentication code.
(ii) Determine the multiplicative inverse of1234 mod 4321 using
extended Euclid’s algorithm.
b) What basic arithmetical and logical functions are used in MD5?
Explain SHA-1 logic. Give comparisons of SHA-a and MD-5.
c) Write the signature generation and verification process of digital
signature algorithm of Digital Signature Standard.
2
[Contd…
Q4. Attempt any TWO parts of the following:
10x2=20
a) Explain full service Kerberos environment. What are the principle
difference between version 4 and other version of Kerberos?
b) Write short notes on ANY THREE
(v) CRL
(vi) PGP message format
(vii) S/MIME functionality
(viii) PUBLIC KEY INFRASTRUCTURE
c) What is digital certificate? Give the format of X.509 certificate
showing the important elements of the certificate, Explain the
format.
Q5. Attempt any TWO parts of the following:
10x2=20
a) How can us Determining and distribution the key for IPSec.
b) (i) What are the typical phases of an operation of a virus or worm
and how does behavior blocking S/W work ?
(ii) what is dual signature? What is the purpose of dual signature?
Explain how a dual signature is constructed.
OR
Explain web security approaches on the basis of socket layer and
transaction in detail.
c) Write short notes on any three of the following:
(i)
Firewall
(ii)
Virus
(iii)
Trojans and worms
(iv)
Trusted Systems
3
C) ii) A computer uses ram chips of 1024*1 capacity. How many chips are
needed and how should their address lines be connected to provide a
memory capacity of 1024 bytes?
B. N. COLLEGE OF ENGINEERING & TECHNOLOGY,
LUCKNOW
Printed Page : 4
Q5. Attempt ALL parts of the following:
ECS -401
SET[A]
10x2=20
(Following paper ID and Roll No. to be filled in your Answer Book)
(A)
What is the purpose of DMA module? Draw block diagram of DMA
data transfer. How it is different from I/O processor?
Roll No.
PAPER ID :
OR Explain of the following:
(i) Memory mapped I/O and Mapped I/O
(ii) Programmed I/O and interrupt driven I/O
(iii) Type of Interrupts and exception.
(B) (i) Draw the architecture of Input Output Processor.
(ii)
What is basic advantage of using interrupt initiated data
transfer over transfer under program control without an
interrupt?
(C) Describe strobe control, handshaking for synchronous and
asynchronous data transfer? What are the advantage and disadvantage
of both methods?
0110
B. Tech.
(SEM. IV) MOCK EXAMINATION. 2012-2013
Computer Organization
TIME: 3 Hours]
Note:
Attempt all questions.
1.
[Total MARKS: 100
Attempt any four parts of the following:
5x4=20
(A)
What is IEEE standard for floating point representation and show
the single and double precision for following: i)-1.27
ii)21 .
(B)
Write short notes on:
i) Arithmetic Micro operation
ii) Computer classification
iii) Digital computer generation
What is over flow? Discuss the difference among positive over flow,
exponent overflow and significand overflow.
What is the benefit of arbitration? Also explain its types in detail.
Draw the diagram of a bus system for four register that uses tri
State buffer and a decoder instead of the multiplexer.
Draw structure of IAS computer and write the difference between
single and multiple bus organization.
Explain functional unit and their interconnection.
4
(C)
(D)
(E)
OR
(F)
1
[Contd…
Q2. Attempt any FOUR parts of the following:
5x4=20
(A)
Find the expression for generation of carry in four bit carry look
ahead. Also draw its logic diagram.
(B) Write assembly program to evaluate the arithmetic statement.
X=(A+B*C)/(C-E*F+G*H) for 0 using stack based,1and 2 address
machine.
OR Explain Addressing modes in detail and write the difference b/w
parallelism and pipelining.
(C)
Write short notes on:
i)Stack organization
ii)Logic Operation
iii)Difficulties in Instruction pipeline
(D)
State Booth’s algo for multiplication of two numbers. Draw a logic
diagram for the implementation of the booth’s algorithm for
determine the multiplication of -23 and 17.
(E)
What is Instruction format? Draw the state diagram of complete
instruction cycle.
OR What is floating point arithmetic operation? Explain it and its type.
(F)
DRAW the architecture of single accumulator based CPU and
general register organization.
Q3.Attempt ALL parts of the following:
(A)
(B)
10x2=20
(i) Define any two the following :
a) Micro-operation
b) Micro-program
c) Micro-instruction
d) Micro-code
(ii) Draw the structure of Complete Instruction Cycle.
What is Micro programmed? Draw the block diagram of micro
programmed control and write its advantage.
2
[Contd…
OR What is hard wired control unit? Draw the block diagram of Hard wired
control unit and write its disadvantage.
(C) Write Short notes on:
i)
wide branch addressing
ii)
micro instruction with next address
iii)
horizontal and vertical microprogramming(Difference)
iv)
micro program sequencing
v)
RISC and CISC
Q4. Attempt any TWO parts of the following:
10x2=20
(A) (i) Write short notes:
(a) Optical disk
(b)Magnetic tape
(c) Magnetic disk
(ii) What is the use of cache also describe its performance factor.
(B) i)
Explain the semiconductor memories . and show the
difference between 2D and 21/ 2 D memory with the help of diagram.
ii)
Explain direct mapping technique. Consider a digital computer
has a memory unit of 64K*16 and a cache memory of 1K words
.The cache uses direct mapping with a block size of four words.
a)How many blocks can the cache accommodate?
b) How many bits are there in the tag, block and word field.
(C) i) Write Shorts notes any two of following
a) Page replacement Scheme
b) Set associative mapping
c) Memory property
d) Multilevel Memories
3
(C)
[Contd…
ii) Apply LRU and FIFO page replacement technique on following
pages and cache memory size is four page:
60120304230321201601
Q5. Attempt ALL parts of the following:
(A)
10x2=20
Describe DMA with suitable block diagram .why does DMA have
priority over the CPU when both request a memory transfer?
Explain.
B. N. COLLEGE OF ENGINEERING & TECHNOLOGY,
LUCKNOW
Printed Page : 4
ECS -401
SET[B]
(Following paper ID and Roll No. to be filled in your Answer Book)
Roll No.
(B) i)
PAPER ID :
Draw the architecture of IOP.
(ii)
Why I/O interterface is required? Describe various method
for I/O interface together with their merits and demerits.
0110
B. Tech.
(SEM. IV) MOCK EXAMINATION. 2012-2013
Computer Organization
(C) Explain serial communication for synchronous and asynchronous
communication methods using handshaking technique.
TIME: 3 Hours]
[Total MARKS: 100
4
Note:
1.
(A)
Attempt all questions.
Attempt any four parts of the following:
5x4=20
What is IEEE standard for floating point representation and show
the single and double precision formats -307.1875.
(B)
Write short notes on:
i) Memory Transfer
ii) Type of computers
iii) Generation of computers
(C)
How can we find out overflow and under flow problem occur?
(D)
Explain Bus Arbitration process in detail.
(E)
What is the use of Tri-state Buffer? Draw bus system diagram using
registers. (Consider four register).
(F)
Draw the basic diagram of computer functional units and show these
functional units using IAS architecture.
1
[Contd…
Q2. Attempt any FOUR parts of the following:
5x4=20
(A)
Draw the logic diagram of fast adder on the basis of their
statement.(Using four bit)
(B) Write assembly program to evaluate the arithmetic statement.
X=A[B+C(D+E)]/F(G+H) for 0 using stack based,1and 3 address
machine.
OR Explain Indirect addressing and relative addressing modes in detail
and write the difference b/w parallelism and pipelining.
(C)
Write short notes on the following
i) Zero order instruction type
ii) Arithmetic micro Operation
iii) Instruction pipeline
(D)
State non restoring algorithm for division of two numbers. Draw a
logic diagram for the implementation of the non restoring algorithm
consider any example for implementation.
(E)
What is Instruction level parallelism? Draw the state diagram of
complete instruction cycle.
(F) Explain array multiplier with the help of 4- bit binary multiplication
and draw its diagram.
Q3.Attempt ALL parts of the following:
(A)
(B)
10x2=20
(i) Define any two the following :
a) PLA
b) Micro-program sequencer
c) Micro-instruction
d) Micro-code
(ii) Write sequence of control steps for execution of a complete
instruction.
Differentiate the micro programmed control unit and hardwired
control unit using block diagram and also write its advantages.
(C) Write Short notes on:
i)
Technique of branch addressing
ii)
Use of next address in micro instruction
iii)
horizontal and vertical microprogramming(Difference)
iv)
use of micro program sequencer
v)
Reduce instruction and complex instruction sets
Q4. Attempt any TWO parts of the following:
(A) (i) Write short notes:
(a) Auxiliary memory
(b) cache memory performance factor
(c) Comparison between mapping technique
(ii) What is the use of virtual memory and write the role of MMU in
virtual memory.
(B) i)
Explain the cache updating technique and show the difference
between 2D and 21/ 2 D memory with the help of diagram.
ii)
Explain set associative mapping technique. Consider a digital
computer has a memory unit of 64K*8 and a cache memory of 1024
words .The cache uses with a block size of four words and we
consider a set contains 4 blocks.
a)How many blocks can the cache accommodate?
b) How many bits are there in the tag, set and word field.
(C) i) Write Shorts notes any two of following
a) LRU and FIFO
b) Fully associative mapping
c) Memory property
d) Memory hierarchy
3
2
[Contd…
10x2=20
[Contd…
Download