1 (a)
Distinguish between cryptography and stenography.
5 M
1 (b)
A source emits letters A{a1, a2, a3, a4} with probabilities p(a1)=0.5 p(a2)=0.15 p(a3)=0.25 p(a4)=0.10 calculate the entropy of the source. Also find the Huffman code with minimum variance.
5 M
1 (c)
Define the Chinese remainder theorem find the solution to the simultaneous equations.
x=2 mod 3
x=3 mod 5
x=2 mod 7
x=2 mod 3
x=3 mod 5
x=2 mod 7
5 M
1 (d)
Define Fermat's little theorem find the result of
i) 312 mod 11
ii) 310 mod 11
i) 312 mod 11
ii) 310 mod 11
5 M
2 (a)
Encode and decode the following sequence using Lz-77 and Lz-78 algorithm.
w a b 8 a b r a r b a r r a c d a c
Give drawbacks of Lz - 77 and Lz - 78 assume window size 9 for Lz - 77.
w a b 8 a b r a r b a r r a c d a c
Give drawbacks of Lz - 77 and Lz - 78 assume window size 9 for Lz - 77.
10 M
2 (b)
What is MDC and MCA? Explain HMAC in detail.
10 M
3 (a)
Write a short note on μ-law and A-law Companding.
10 M
3 (b)
Explain Diffie-Hellman key exchange algorithm with an example. Also explain attack on Diffie-Hellman key exchange.
10 M
4 (a)
Explain attack on double DES with example write with neat black diagram triple DES with two keys.
10 M
4 (b)
Write short note on AES.
10 M
5 (a)
Write short note on H-264 encoder and decoder.
10 M
5 (b)
Explain Intrusion detection system in detail.
10 M
Write short note (Any Three)
6 (a)
Ethical hacking
7 M
6 (b)
Attacks on RSA.
7 M
6 (c)
JPEG - 2000.
7 M
6 (d)
Biometric Authentication.
7 M
More question papers from Data Compression and Encryption