GTU Information Technology (Semester 6)
Dot Net Technology
June 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Explain various types of attack on computer system.
7 M
1 (b) What is security mechanism? List and explain various security mechanism.
7 M

2 (a) Explain the conventional security model used for information security.
7 M
2 (b) Explain cryptanalysis. Discuss any one technique for it.
7 M
2 (c) What attacks can be done on encrypted text? Explain them.
7 M

3 (a) Compare public key and private key cryptography. Also list various algorithms for each.
7 M
3 (b) With the help of example explain how can we find out GCD of two numbers using 07 Euclid algorithm.
7 M
3 (c) What is digital signature? Explain its use with the help of example.
7 M
3 (d) Explain play fair cipher with suitable example.
7 M

4 (a) Explain limitation of DES in detail.
7 M
4 (b) List and Explain various key management techniques.
7 M
4 (c) Explain RSA algorithm.
7 M
4 (d) How can we achieve web security? Explain with example.
7 M

Write a note on following (Any 4):
5 (a) Pretty Good Privacy.
4 M
5 (b) Kerberos.
4 M
5 (c) Hill cipher.
4 M
5 (d) Elliptic curve cryptography.
4 M
5 (e) Diffie-Hellman key exchange.
4 M
5 (f) Message Authentication code.
4 M



More question papers from Dot Net Technology
SPONSORED ADVERTISEMENTS