MU Electronics and Telecom Engineering (Semester 7)
Data Compression and Encryption
May 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Classify data compression technique. Give the definition and an example of each
5 M
1 (b) Explain predictive coding technique for compression with an example
5 M
1 (c) What are one way trap door functions ? What is their importance in cryptography?
5 M
1 (d) State
i) Chinese reminder theorem
ii) Fermat's little theorem
iii) Euler's theorem
iv) definition of Euler's quotient function
v) definition of primitive root
5 M

2 (a) Draw minimum variance Huffman tree for the following alphabet with given set of probabilities. Find average length, coding efficiency, and variance of the code. A: {a,b,c,d,e} P : {0.2, 0.4, 0.1, 0.2, 0.1}
10 M
2 (b) Consider a source with alphabet A = {a1, a2, a3} with probability model {0.8, 0.02, 0.18} respectively. Perform arithmetic coding and generate a decimal tag for the sequence : a1a3a2a1
10 M

3 (a) Perform LZ-78 coding on the following binary string and evaluate the compression ratio :
0 1 0 0 0 1 1 1 0 0 1 1 1 0 1 1 1 1 1 1 0 0 0 0 1 1 1 1 1 1 0 1 1 0 1
8 M
3 (b) Give block diagram of MF-JH encoder.
Give its functioning in detail.
Also explain what is auditory masking and temporal masking.
12 M

4 (a) Explain working of DES with a block diagram.
10 M
4 (b) Explain hash and MAC algorithms used for authentication.
10 M

5 (a) Prove that the key exchanged between use rA and user B with Diffie-Hellman key exchange algorithm, is the same.
10 M
5 (b) Explain the RSA encryption - decryption algorithm. Specifically explain why the decrypted message is the same as the plain text.
10 M

6 (a) Explain MPEG video compression standard.
10 M
6 (b) Explain all the steps in JPEG image compression standard.
10 M

Write short notes on (any two)
7 (a) Viruses, worms and anti virus technique
10 M
7 (b) Elliptic curve cryptography
10 M
7 (c) Digital signatures
10 M
7 (d) Biometric Authentication
10 M



More question papers from Data Compression and Encryption
SPONSORED ADVERTISEMENTS