You are here: Home > Computer Science CSE
All posts from

MCSCS203/MCSIS203 Computer Security & Applied Cryptography M.Tech Model Question Paper : mgu.ac.in

Name of the University : Mahatma Gandhi University
Department : Computer Science and Engineering
Degree : M.Tech
Subject Code/Name : MCSCS203/MCSIS203/Computer Security and Applied Cryptography
Sem : II
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper :
I : https://www.pdfquestion.in/uploads/mgu.ac.in/5277-1-MCSCS,MCSIS%20203%20Computer%20Security%20and%20Applied%20Cryptography%20-set1.doc
II : https://www.pdfquestion.in/uploads/mgu.ac.in/5277-2-MCSCS,MCSIS%20203%20Computer%20Security%20and%20Applied%20Cryptography%20-set2.doc

MGU Computer Security Question Paper

M.TECH. Degree Examination :
Branch: Computer Science and Engineering
Specialization :

Related : MGU MCSCS201/MCSIS201 Modern Computer Networks M.Tech Model Question Paper : www.pdfquestion.in/5273.html

1. Computer Science and Engineering,
2. Information Systems
Model Question Paper – II :
Second Semester :
MCSCS 203/ MCSIS 203 Computer Security and Applied Cryptography :
(Regular – 2011 Admission on wards)
Time: Three hrs
Max: 100 marks
1.
a) Explain in detail substitution and transposition techniques. (9)
b) Discuss a model for network security (8)
c) Explain in detail the various steganographic techniques (8)
OR
2.
a) Explain the Playfair Cipher technique in detail . (7)
b) Explain one-time pad. What are the 2 problems with this technique (8)
c) Encrypt the message “meet me at the usual place at ten rather than eight o’clock” using the Hill Cipher with the key .Show your calculations and the result. (10)

3.
a) Explain in detail the block cipher modes of operation. (10)
b) Give a brief description of DES encryption algorithm (8)
c) Briefly explain elliptic curve cryptography . (7)
OR
4.
a) Explain the AES algorithm in detail. (10)
b) Explain RSA algorithm . (8)
c) Explain the Diffie Hellman key exchange algorithm (7)

5.
a) Explain MD5 algorithm in detail (9)
b) Briefly explain HMAC algorithm (8)
c) Discuss PGP cryptographic functions (8)
OR
6.
a) Give an overview of Kerberos. (9)
b) Explain DSA algorithm in detail. (8)
c) Briefly explain SHA algorithm. (8)

7.
a) Briefly explain the IPv6 architecture (8)
b) What are the roles of the Oakley key determination protocol and ISAKMP in IPSec? (8)
c) List and briefly define the principal categories of SET participants (9)
OR
8.
a) Explain AH and ESP in detail (10)
b) Explain Transport Layer Security. (8)
c) Explain in detail SSL Record Protocol (9)
(4 x 25 = 100 marks)

Paper – I

1. (a) Explain the model of a conventional cryptosystems. (10 Marks)
(b) Briefly define the categories of passive and active security attacks. (5 Marks)
(c) What are the two general approaches to attacking a cipher? (10 Marks)
OR
2. (a) What is the difference between a block cipher and a stream cipher? (10 Marks)
(b) What is steganography? (5 Marks)
(c) Distinguish between monoalphabetic and polyalphabetic cipher. (10 Marks)

3. (a) Explain Blowfish. (15 Marks)
(b) What is the purpose of S-boxes in DES? (5 Marks)
(c) Briefly explain a Group, Ring and a Field. (5 Marks)
OR
4. (a) With suitable example explain the RSA algorithm (15 Marks)
(b) Explain Diffie-Hellman key exchange. (10 Marks)

5 (a) What is a Message Authentication code? (10 Marks)
(b) What is the difference between weak and strong collision resistance? (5 Marks)
(c) Explain S/MIME. (10 Marks)
OR
6 (a) What is the purpose of X.509 standard? (10 Marks)
(b) Explain digital signature. (10 Marks)
(c) What are the principal services provided by PGP (5 Marks)

7 (a) List IPSec services. (5 Marks)
(b) Briefly define the principal categories of SET participants. (10 Marks)
(c) Sketch IPSec authentication header and explain various fields. (10 Marks)
OR
8. (a) List and define three classes of intruders. (5 Marks)
(b) Briefly explain SSL architecture. (10 Marks)
(c ) Explain the different types of firewalls. (10 Marks)

Paper – II

M.Tech. Degree Examination :
Branch : Computer Science and Engineering
Specialization : Computer Science and Engineering
Second Semester
MCSCS 206.3 Real Time Systems (Elective IV) (Regular – 2011 Admission onwards)
Time : 3hrs
Maximum : 100 marks

Answer all questions :
1. a) Write notes on hard and soft timing constraints?(8)
b) Explain about temporal parameters of real time work load? (8)
c) Describe about the periodic tasks model? (9)
or
2. a) Explain about Hard and soft real time systems? (9)
b) Discuss about various dependencies among jobs? (10)
c) Explain various functional parameters that affect the access control of resources? (7)

3. a) Discuss about priority driven scheduling with an example? (8)
b) Describe the challenges in validating timing constraints in priority driven
systems? (10)
c) Discuss about static timer driven scheduler? (7)
or
4. a) Explain the general structure of cyclic schedulers?(8)
b) Discuss how to improve the average response time of a periodic jobs?(9)
c ) explain weighted round robin scheduling?(8)

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap