1 (a)
Classify data compression technique. Give the definition and an example of each
5 M
1 (b)
Explain predictive coding technique for compression with an example
5 M
1 (c)
What are one way trap door functions ? What is their importance in cryptography?
5 M
1 (d)
State
i) Chinese reminder theorem
ii) Fermat's little theorem
iii) Euler's theorem
iv) definition of Euler's quotient function
v) definition of primitive root
i) Chinese reminder theorem
ii) Fermat's little theorem
iii) Euler's theorem
iv) definition of Euler's quotient function
v) definition of primitive root
5 M
2 (a)
Draw minimum variance Huffman tree for the following alphabet with given set of probabilities. Find average length, coding efficiency, and variance of the code. A: {a,b,c,d,e} P : {0.2, 0.4, 0.1, 0.2, 0.1}
10 M
2 (b)
Consider a source with alphabet A = {a1, a2, a3} with probability model {0.8, 0.02, 0.18} respectively. Perform arithmetic coding and generate a decimal
tag for the sequence : a1a3a2a1
10 M
3 (a)
Perform LZ-78 coding on the following binary string and evaluate the compression ratio :
0 1 0 0 0 1 1 1 0 0 1 1 1 0 1 1 1 1 1 1 0 0 0 0 1 1 1 1 1 1 0 1 1 0 1
0 1 0 0 0 1 1 1 0 0 1 1 1 0 1 1 1 1 1 1 0 0 0 0 1 1 1 1 1 1 0 1 1 0 1
8 M
3 (b)
Give block diagram of MF-JH encoder.
Give its functioning in detail.
Also explain what is auditory masking and temporal masking.
Give its functioning in detail.
Also explain what is auditory masking and temporal masking.
12 M
4 (a)
Explain working of DES with a block diagram.
10 M
4 (b)
Explain hash and MAC algorithms used for authentication.
10 M
5 (a)
Prove that the key exchanged between use rA and user B with Diffie-Hellman key exchange algorithm, is the same.
10 M
5 (b)
Explain the RSA encryption - decryption algorithm. Specifically explain why the decrypted message is the same as the plain text.
10 M
6 (a)
Explain MPEG video compression standard.
10 M
6 (b)
Explain all the steps in JPEG image compression standard.
10 M
Write short notes on (any two)
7 (a)
Viruses, worms and anti virus technique
10 M
7 (b)
Elliptic curve cryptography
10 M
7 (c)
Digital signatures
10 M
7 (d)
Biometric Authentication
10 M
More question papers from Data Compression and Encryption