MU Electronics and Telecom Engineering (Semester 7)
Data Compression and Encryption
May 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) How are DPCM and ADPCM used for audio compression?
5 M
1 (b) Compare public key and private key cryptosystem giving an example for each.
5 M
1 (c) Explain the principle of "arithmetic coding" with a suitable example.
5 M
1 (d) What are digital signatures and how are they used?
5 M

2 (a) Compare statistical text compression and dictionary text compression. List the techniques in each method.
8 M
2 (b) Discuss various techniques for lossy and lossless image compression.
12 M

3 (a) Explain the working of an MP3 encoder and decoder or audio compression.
10 M
3 (b) What is motion compensation in video compression? Explain the MPEG video compression standard.
10 M

4 (a) Explain the working of triple DES with two and three keys.
10 M
4 (b) Explain RSA algorithm with an example.
10 M

5 (a) What is Diffie-Hellman key exchanger? Explain with an example.
10 M
5 (b) What are the requirements of Hash and a MAC function?
10 M

6 (a) What are various aspects of firewall design?
10 M
6 (b) What are digital signatures? How are they implemented?
10 M

Write short notes on any two of the following:
7 (a) Chinese Remainder Theorem.
10 M
7 (b) Secure Electronic Payment System.
10 M
7 (c) Viruses and Worms, their Counter-measures.
10 M



More question papers from Data Compression and Encryption
SPONSORED ADVERTISEMENTS