MU Electronics and Telecom Engineering (Semester 7)
Data Compression and Encryption
December 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Discuss the basic data compression techniques with suitable examples
5 M
1 (b) Explain predictive coding technique for compression
5 M
1 (c) Explain Chinese remainder algorithm with example.
5 M
1 (d) What is the difference between MDC and MAC? Explain criteria for cryptographic hash function
5 M

2 (a) Design a minimum variance Huffman code for a source that put out letter from an alphabet A={a1,a2,a3,a4,a5,a6} with P(a1)=P(a2)=0.2, P(a3=0.25, P(a4=0.05, P(a5)=0.15, P(a6)=0.15
Find the entropy of the source, avg. length of the code and efficiency. Also comment on difference between Huffman code and minimum variance Huffman code.
10 M
2 (b) Encode the following sequence using the LZ-77 algorithm barrayarbbybbarrayarbbay. Assume you have a window size of 15 with look ahead buffer of size 7. Further more assume that c(a)=1,c(b)=2 , c(b)=3 c(r)=4, c(y)=5.
10 M

3 (a) Discuss the drawbacks of different conventional method in audio compression. Explain silence compression in lossy audio compression technique.
10 M
3 (b) Describe the format of \mu -law encoder and decoder specified by G.711. Find out the codeword for - 656 input sample using \mu-law encoder specified by G.711
Give difference between \mu-law and A law companding.
10 M

4 (a) Explain the attack on double DES. Discuss Triple DES with three keys and triple DHS with two keys.
10 M
4 (b) Explain steganography with example Distinguish between steganography and Cryptography.
10 M

5 (a) State Fermat's little theorem and Euler's theorem.
Find multiplicative inverse of following without using extended euclidean algorithm.
(i) 8-11 mod 77 (ii) 7-1 mod 15
Also explain the use of Euler's theorem in RSA cryptosystem.
10 M
5 (b) Explain digital signature using RSA with example.
10 M

6 (a) Write a short note on secure Electronic payment system
10 M
6 (b) Discuss Intruders, viruses and worm in detail.
Also explain logical bomb and trojan horse
Given difference between viruses and worms
10 M

Attempt any two.
7 (a) JPEG in image compression
10 M
7 (b) MPEG video standard
10 M
7 (c) IDEA
10 M
7 (d) Biometric Authentication
10 M



More question papers from Data Compression and Encryption
SPONSORED ADVERTISEMENTS