0% found this document useful (0 votes)
55 views3 pages

Unit 1

The document outlines the topics covered in 5 units of a CNS course. Unit 1 covers classic encryption techniques, the Chinese Remainder theorem, and the OSI security architecture model. Unit 2 covers DES, RSA, and Diffie-Hellman key exchange. Unit 3 covers digital signature standards, SHA, and HMAC and CMAC. Unit 4 covers Kerberos, SET, and firewalls. Unit 5 covers PGP, IP security, and web security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views3 pages

Unit 1

The document outlines the topics covered in 5 units of a CNS course. Unit 1 covers classic encryption techniques, the Chinese Remainder theorem, and the OSI security architecture model. Unit 2 covers DES, RSA, and Diffie-Hellman key exchange. Unit 3 covers digital signature standards, SHA, and HMAC and CMAC. Unit 4 covers Kerberos, SET, and firewalls. Unit 5 covers PGP, IP security, and web security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CNS

UNIT-1
1.Classic Encrypton Techniques.

2.Chinese Remainder theorem.

3.OSI Security architecture model with neat diagram.

UNIT-2
1.DES.

2.RSA

3.Diffic-hellman key exchange.

UNIT-3
1.Digital signature standard.

2.SHA.

3.HMAC and CMAC.

UNIT-4
1.Kerbros.

2.SET.

3.Firewalls.

UNIT-5
1.PGP.

2.IP Security.

3. Web security
2-MARKS
UNIT 1

1. State Euler’s theorem

2. Birthday attack

3. Types of cryptanalysis attacks

4. 5 modes of operation

5. 4 basic task designing particular security service

UNIT 2
1. Primitive operation in RC5

2. 5 modes of operation

3. Roles of public and private key

4. Meet in the middle attack in DS

5. What is avalanche effect

UNIT 3
1. What is function compression in hash function

2. List the properties of the digital signature

3. What you mean by 1way authentication in hash function

4. define Life cycle of key management

5. types of attacks addressed by message authentication

UNIT 4
1. list down the types of virus

2. define auditor, give it two forms


3. difference between Kerberos v4 and v5

4. types of IDS

5. X 509 certification

UNIT 5

1. Define S/MIME

2. Difference between transport mode and tunnel mode

3. Mention 4 SSL protocols

4. Define Botnets

5. Limitations of SMTP/RFC 822

You might also like