MU Electronics and Telecom Engineering (Semester 7)
Data Compression and Encryption
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Distinguish between cryptography and stenography.
5 M
1 (b) A source emits letters A{a1, a2, a3, a4} with probabilities p(a1)=0.5 p(a2)=0.15 p(a3)=0.25 p(a4)=0.10 calculate the entropy of the source. Also find the Huffman code with minimum variance.
5 M
1 (c) Define the Chinese remainder theorem find the solution to the simultaneous equations.
x=2 mod 3
x=3 mod 5
x=2 mod 7
5 M
1 (d) Define Fermat's little theorem find the result of
i) 312 mod 11
ii) 310 mod 11
5 M

2 (a) Encode and decode the following sequence using Lz-77 and Lz-78 algorithm.
w a b 8 a b r a r b a r r a c d a c
Give drawbacks of Lz - 77 and Lz - 78 assume window size 9 for Lz - 77.
10 M
2 (b) What is MDC and MCA? Explain HMAC in detail.
10 M

3 (a) Write a short note on μ-law and A-law Companding.
10 M
3 (b) Explain Diffie-Hellman key exchange algorithm with an example. Also explain attack on Diffie-Hellman key exchange.
10 M

4 (a) Explain attack on double DES with example write with neat black diagram triple DES with two keys.
10 M
4 (b) Write short note on AES.
10 M

5 (a) Write short note on H-264 encoder and decoder.
10 M
5 (b) Explain Intrusion detection system in detail.
10 M

Write short note (Any Three)
6 (a) Ethical hacking
7 M
6 (b) Attacks on RSA.
7 M
6 (c) JPEG - 2000.
7 M
6 (d) Biometric Authentication.
7 M



More question papers from Data Compression and Encryption
SPONSORED ADVERTISEMENTS