Escolar Documentos
Profissional Documentos
Cultura Documentos
www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) Which parameters and design choices determine the actual algorithm of a
Feistel cipher?
[16]
[16]
www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
(a) Viruses
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What are differences between a block cipher and a stream cipher?
(b) Explain various modes of operations of block ciphers.
[16]
[6]
[5]
[5]
www.andhracolleges.com
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. (a) What is it importance to study the Feistel cipher?
(b) What is the purpose of the S-boxes in DES?
[8]
[8]
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
www.andhracolleges.com
(b) Why is R64 conversion useful for an e-mail application?
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
8. Write notes on
(a) Trapdoors
(b) Logic bomb
(c) Trojan horses [5+5+6]
⋆⋆⋆⋆⋆
www.andhracolleges.com
1. This problem provides a numerical example of encryption using a one-round version
of DES. We start with the same bit pattern for the key and plain text, namely,
In hexadecimal notation 0 1 2 3 4 5 6 7 8 9 A B C D E F
Inbinary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
www.andhracolleges.com
(i) write down the cipher text. [16]
8. Write notes on
(a) Viruses
www.andhracolleges.com
(b) Worms
(c) Bacteria [6+6+4]
⋆⋆⋆⋆⋆
www.andhracolleges.com
Seminar Topics - Scholarships - Admission/Entrance Exam Notifications
2 ofUSA-UK-Australia-Germany-France-NewZealand
2 Universities List