CNS - 2
CNS - 2
Tumeancomanent canbe pes cope ine bg. “This pobem coins either Oor | antec tise 01 hsp pena i awit te pean ngpsack, ‘Seppse thatthe Knpsack caries 2, 91, Land 17.ANock fit ou egw rept trent eae whch eae the phn et (and. The orespedig inert canbe Bc a es ng Freteplain tetas allows. Kup 2-9 BIST UIST Pointer: 10110 10101 Ciphers 24134189300 203417 Inpro Kapa Agritn : ‘ie importane of apc rin nou ly essa tons, Leste optating pte to allocate rues ta mamkr of wks hak ris eee) _stoachiee matin cen 2 ets the wes ining the amber vbr his when iy esi oh 3. eau ps be tie to mami he pot | Scanned with CamScanner78 CRYPTOGRAPHY AND NETWORK SECURITY [JNTU-HYDERAg, 7 SHORT QUESTIONS Q1. Discuss about Blowfish. (important Question | May-17(R39 Anat Por answer ref Xe H.O4. Q2. Define Stream ciphers? oy sedi 02 Cimportant Question 1May-17°R9) a2 For answer refer Unit Q3. List out the advantages of RCA algorithm. (mportant Question | Dee.-19(R4 Ans: Vor answer refer Unit-ll, QS. on Ph Q4. Differentiate conventional and public key encryption. é ‘et aes eet {important Question | APrILtO(RI5 was:_For answer refer Unit-ll, QU. ESSAY QUESTIONS Q5, Enumerate in detail al aneat diagram. bout the steps in Blow Fish Algorithm and explain the process of each roung),, Anst_Foranswer refer Unit, Q25. (Ove. -19(Rt6), 05 | Apri-46(R18). 5 | Dee-17(R13), 04) ER Q6. Write a short note on RC4. E 2 (ttay-17(R19), 5(b) | OctINOw-16(R19), 5) ‘Ans: For answer refer Unit-Il, Q35, Q7. Explain RSA algorithm with suitable examples. Fz Anst_For answer refer Unit-ll, Q43. (May-19(R16), A5(a) | May-47(R13), As(a)) Ew 8. Enumerate Diffie-Hellman Key exchange for encryption and decryption with suitable examples. Ff > Ans: For answer refer Unit-ll, Q48, {Dee.-19(R16), 4(0) | Apr-18(R15), Qs(a) [Pe Q9. Explain block cipher design principles. Ans: For answer refer Unit Il, QI. (Important Question | Oct/Nov.-16(R12), a6, Q10. Enumerate in detail the steps in Data Encryption Standard Algorithm and explain the process involy, in each round with a neat diagram. Ans: For answer refer Unitll, QI. {Important Question | NoviDee.-20(R6 Q11. Explain the AES algorithm. Ans: For answer refer Unit-ll, Q22. {important Question | May-t6(R13)c¢ Q12.. Explain the process of encryption and decryption in RCS algorithm. 1, Q28. the encryption process in IDEA algorithm with a neat sketch. Ans: Foranswer refer Unit, Q31. ; Ans: _ For answer refer Uni Q13. Des: Important Quests important Question | Nov/Dee.-20(R6), a7 14, ae the public key cryptographic principles. Explain RSA algorithm for given example, whet P=3andq=11. Ans: For answier refer Unit-l, Q41. {Important Question | Dec.-19(R16), Qt WARNING: xerouPhotocopying of this book sa CRIMINAL act. Anyone found gully s LIABLE fo face LEGAL proceedings. ~~ Scanned with CamScanner