0% found this document useful (0 votes)
121 views13 pages

CS6701-Cryptography and Network Security

This document contains a question bank for the course CS6701 - Cryptography and Network Security for the 7th semester students of Valliammai Engineering College. It has questions divided into three parts - Part A containing short answer questions, Part B containing questions requiring explanations and Part C containing application-based questions requiring creation of solutions. The questions cover topics from Unit 1 of the syllabus including introduction to cryptography, number theory concepts, classical encryption techniques, network security architecture and attacks. Sample questions include differentiating between active and passive attacks, explaining the use of modular arithmetic in cryptography, comparing block and stream ciphers, and applying encryption algorithms like Caesar cipher to encrypt messages.

Uploaded by

Vash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views13 pages

CS6701-Cryptography and Network Security

This document contains a question bank for the course CS6701 - Cryptography and Network Security for the 7th semester students of Valliammai Engineering College. It has questions divided into three parts - Part A containing short answer questions, Part B containing questions requiring explanations and Part C containing application-based questions requiring creation of solutions. The questions cover topics from Unit 1 of the syllabus including introduction to cryptography, number theory concepts, classical encryption techniques, network security architecture and attacks. Sample questions include differentiating between active and passive attacks, explaining the use of modular arithmetic in cryptography, comparing block and stream ciphers, and applying encryption algorithms like Caesar cipher to encrypt messages.

Uploaded by

Vash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

VALLIAMMAI ENGINEERING COLLEGE

SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK

VII SEMESTER

CS6701- Cryptography and Network Security

Regulation – 2013

Academic Year 2018 – 19

Prepared by

Ms. N.Poornima, Assistant Professor/CSE

Mr. T. Rajasekaran, Assistant Professor/CSE

STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : CS6701- Cryptography and Network Security
SEM / YEAR: VII/IV

UNIT I -INTRODUCTION & NUMBER THEORY


Services, Mechanisms and attacks-the OSI security architecture-Network security model-
Classical Encryption techniques (Symmetric cipher model, substitution techniques,
transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY:
Groups, Rings, Fields-Modular arithmetic- Euclid’s algorithm-Finite fields- Polynomial
Arithmetic –Prime numbers-Fermat’s and Euler’s theorem- Testing for primality -The
Chinese remainder theorem- Discrete logarithms.
PART - A
Q.No Questions BT Level Competence
1 Differentiate active attacks and passive attacks. Understand BTL-2
2 Define Steganography. Remember BTL-1
3 Quote Euler’s theorem. Remember BTL-1
4 Define cryptanalysis. Remember BTL-1
5 Compare Substitution and Transposition techniques. Analyse BTL-4
6 Analyse why Random numbers are used in Network Security. Analyse BTL-4
7 List the four categories of security threats. Remember BTL-1
8 Calculate GCD of 1070 and 1066 using Euclid algorithm. Apply BTL-3
9 Define primitive root. Remember BTL-1
10 Give examples for substitution cipher. Understand BTL-2
11 Define cryptography Remember BTL-1
12 Evaluate BTL-5
Explain why Modular arithmetic has been used in cryptography.
13 Compare Block cipher and Stream cipher. Analyse BTL-4
14 Classify the basic functions used in encryption algorithms. Apply BTL-3
15 Describe security mechanism. Understand BTL-2

16 Assess the following cipher text using brute force attack: Evaluate BTL-5
CMTMROOEOORW (Hint: Algorithm-Rail fence).
17 Generalize why network need security. Create BTL-6
18 Give examples for transposition cipher. Understand BTL-2
Show how to convert the given text “VALLIAMMAI” into
19 Apply BTL-3
cipher text using Rail fence Technique.
20 Plan how many keys are required by two people to communicate Create BTL-6
via a cipher.
PART - B
State and Describe
1 (i) Fermat’s theorem. (8) Remember BTL-1
(ii) Euler’s theorem. (5)
(i) Tabulate the substitution Techniques in detail. (5)
2 Remember BTL-1
(ii) Describe the Transposition Techniques in detail. (8)

STUDENTSFOCUS.COM
(i) List the different types of attacks and explain in
3 detail.(6) Remember BTL-1
(ii) Describe in detail about the types of cryptanalytic
attack. (7)
(i) Evalute321 mod 11 using Fermat’s theorem. (7)
(ii) State Chinese Remainder theorem and find X for the given
set of congruent equations using CRT. (6)
4 X=2(mod 3) Evaluate BTL-5
X=3(mod 5)
X=2(mod 7)

5 Generalize the security services classifications and security Create BTL-6


mechanisms in detail. (13)
Summarize the following in detail.
6 (i) Modular Exponentiation. (7) Understand BTL-2
(ii) Finite fields. (6)
(i) Apply Caesar cipher and k=5 decrypt the given Cipher
7 text “YMJTYMJWXNIJTKXNQJSHJ”. (7) Apply BTL-3
(ii) Apply Vigenere cipher, encrypt the word “explanation”
using the key “leg”. (6)
8 (i) Discuss briefly the Discrete Algorithms. (6) Understand BTL-2
(ii) Discuss about the Groups, Rings and Field (7)
Differentiate between transposition cipher and substitution
9 cipher. Apply two stage transpositions Cipher on the “treat Analyse BTL-4
diagrams as single units” using the keyword “sequence”. (13)
(i)What is Steganography? Briefly examine any three techniques
10 used. (6) Remember BTL-1
(ii)What is mono-alphabetic cipher? Examine how it differs from
Caesar cipher? (7)
(i) Solve using playfair cipher. Encrypt the word “Semester
Result” with the keyword “Examination”. List the rules used.
(7)
(ii) Demonstrate the encryption of the message “PAY” using hill
11 cipher with the following key matrix and show the decryption. (6) Apply BTL-3
|17 17 5|
K= |21 18 21|
|2 2 19|

(i) With a neat block diagram, explain the network security


model and the important parameters associated with it.
12 (6) Analyse BTL-4
(ii) Differentiate active and passive security attacks.
Categorize these attacks and explain one examples of
each. (7)
(i) Explain how to solve x2≡1(mod 35) using Chinese remainder
13 theorem. (6) Analyse BTL-4
(ii) Explain in detail the Euclid’s Algorithm. (7)

STUDENTSFOCUS.COM
(i) Discuss the following
a) Message Integrity (1)
14 b) Denial of Service (1) Understand BTL-2
c) Availability (1)
d) Authentication (1)
(ii) Estimate 1113 mod 53 using modular exponentiation. (9)
PART - C

Formulate ceaser cipher for the cipher Text: PHHW


PH DIWHU WKH WRJD SDUWB to identify the
1 plain text with the default key K=3 and also give Create BTL-6
atleast three important characteristics of this
problem that is enabled to bruteforce cryptanalysis.(15)
Design the plaintext in rows of width l and read it off
by columns. Take the columns in a order defined by a
key. If you take the columns in their natural order—
without using a key—, then the procedure amounts to
a path transposition. The Scytale corresponds to such
a columnar transposition with a trivial key.(15)

Example: l = 5,
2 Create BTL-6
Keyword = A P P L E
Key = 1 4 5 3 2

Plaintext = T H I S I
S A C O L
U M N A R
T R A N S
P O S I T
I O N

Point out an example of polynomial arithmetic over


GF(2). For f(x) = (x7 + x5 + x4 + x3 + x + 1) and
3 Evaluate BTL-5
g(x) = (x3 + x + 1), the figure shows f(x) + g(x); f(x)
- g(x); f(x) * g(x); and f(x)/g(x). Note that g(x) f(x).
(15)
Analyze how the ITU-T3 Recommendation X.800,
4 Security Architecture for OSI, defines such a Evaluate BTL-5
systematic approach.(15)

STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV

UNIT II - BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY


Data Encryption Standard-Block cipher principles-block cipher modes of operation-
Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key
cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management –
Diffie Hellman Key exchange-Elliptic curve arithmetic- Elliptic curve cryptography.
PART - A
Q.No Questions BT Level Competence
1 Define RC5. Remember BTL-1
2 List the five modes of operation of block cipher. Remember BTL-1
3 Summarize the purpose of S-boxes in DES. Understand BTL-2
4 Formulate few applications of RC5 algorithm. Create BTL-6
5 Give the strengths of Triple DES. Understand BTL-2
Criticise why the middle portion of triple DES a decryption
6 Analyse BTL-4
rather than encryption?
7 List the function of state array. Remember BTL-1
8 Point out is it possible to use the DES algorithm to generate Analyse BTL-4
message authentication code.
9 Discover the difference between sub bytes and sub words. Apply BTL-3
Describe the triple encryption. How many keys are used in
10 Understand
triple encryption? BTL-2
11 Give the applications of the public key crypto systems. Understand BTL-2
12 Explain any one attacking technique in RSA. Evaluate BTL-5
Discover the Difference between public key and conventional
13 Apply
encryption. BTL-3
14 Analyse the purpose of Diffie Hellman key exchange. Analyse BTL-4
15 Define the principle elements of a public key crypto system. Remember BTL-1
List four general characteristics of schema for the distribution
16 Remember
of the public key. BTL-1
Show what requirements must a public key crypto system to
17 Apply
fulfil security. BTL-3
Evaluate the formula for encryption and decryption using
18 Evaluate BTL-5
RSA algorithm.
19 Generalize elliptic curve cryptography. Create BTL-6
20 Define avalanche effect. Remember BTL-1
PART - B
1 Describe in detail, AES algorithm with round functions. (13) Remember BTL-1
Explain the following modes of operation in block
cipher.
2 Analyse BTL-4
(i) Electronic code book and Cipher block chaining. (7)
(ii) Cipher feedback mode and output feedback mode.(6)

STUDENTSFOCUS.COM
(i) Formulate the single round of DES algorithm. (7)
3 Create BTL-6
(ii)Design the key generation process of DES. (6)
(i) Describe the RC5 method used for encryption and
4 decryption. (6). Remember BTL-1
(ii)Describe Triple DES and its applications.(7)
(i) Draw the general structure of DES and describe how
5 encryption and decryption are carried out.(6) Remember BTL-1
(ii) Identify the strength of DES algorithm.(7)
(i) Analyze how men in middle attack is performed
on double Data Encryption Standard.(7)
6 Analyse BTL-4
(ii) Explain the substitution bytes transformation and
add round key transformation of AES cipher. (6)
(i) How AES is used for encryption/Decryption?
7 Discuss with example. (7) Understand BTL-2
(ii) Discuss in detail about Blowfish. (6)
Evaluate using Diffie-Hellman key exchange technique.
Users A and B use a common prime q=11 and a
primitive root alpha=7. (13)
(i) If user A has private key XA=3.What is A’s public key
8 YA? Evaluate BTL-5
(ii)If user B has private key XB=6. What is B’s public key
YB?
(iii) What is the shared secret key? Also write the algorithm.
(i) Describe RSA Algorithm.(7)
9 (ii)Estimate the encryption and decryption values for the Understand BTL-2
RSA algorithm parameters. P=7, Q=11, E=17, M=8. (6)
(i) Summarize the role of discrete log in the Diffie-Hellman
key exchange in exchanging the secret key among two
10 users.(6) Understand BTL-2
(ii) What are elliptic curves? Describe how the elliptic curves
are useful for Cryptography?(7)
Describe the key management of public key encryption in
11 Remember BTL-1
detail.(13)
Apply the mathematical foundations of RSA algorithm.
Perform encryption decryption for the following data. P=17,
12 Apply BTL-3
q=7, e=5, n=119, message=”6”. Use Extended Euclid’s
algorithm to find the private key.(13)
(i) User A and B use Diffie-Hellman key exchange a
common prime q=71 and a primitive root a=7.Calculate
the following. If user A has private key XA=5, what is
A’s public key YA. If user A has private key XB=12,
what is B’s public key YB and what is shared secret key?
13 Apply BTL-3
(7)
(ii) Consider the elliptic curve E11 (1, 6); that is the curve is
defined by y2=x3+x+6 with a modules of P=11. Calculate
all the points in E11 (1, 6). Start by calculation the right
hand side of the equation of all the values of n? (6)
(i) Explain briefly about Diffie-Hellman key exchange
14 algorithm with its pros and cons. (6) Analyse BTL-4
(ii) Explain public key cryptography and when is it preferred.
(7)

STUDENTSFOCUS.COM
PART - C

Compose the example of using simplified DES

Input:

10100101
1 Create BTL-6
Key:

0 0 1 0 0 1 0 1 1 1

with suitable justification (15)


Assess the criteria used in the design of DES, as reported in
2 [COPP94], focused on the design of the S-boxes and on the P Evaluate BTL-5
function that takes the output of the S boxes . (15)
Discuss: though any size of block is acceptable, following
3 aspects are borne in mind while selecting a size of a block. Create BTL-6
(15)
Deduce the types of attacks to which information is typically
4 Evaluate BTL-5
subjected in CNS. (15)

STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV

UNIT III - HASH FUNCTIONS AND DIGITAL SIGNATURES


Authentication requirement – Authentication function – MAC – Hash function – Security of
hash function and MAC – MD5 – SHA – HMAC – CMAC – Digital signature and
authentication protocols – DSS – EI Gamal – Schnorr.
PART - A
Q.No Questions BT Level Competence
1 Give the requirements for message authentication. Understand BTL-2
2 Interpret one way property in hash function. Understand BTL-2
3 Explain direct and arbitrated digital signature. Analyse BTL-4
4 Define digital signature. Remember BTL-1
Formulate the types of attacks addressed by message
5 Create BTL-6
authentication
6 List the classes of message authentication function. Remember BTL-1
7 Evaluate the security of hash functions and MAC. Evaluate BTL-5
8 Distinguish DSA and ElGamal algorithm. Understand BTL-2
9 Define MAC. Remember BTL-1
10 List the requirements of hash function. Remember BTL-1
11 Estimate the block size of MD5. Understand BTL-2
12 Differentiate MAC and hash function. Analyse BTL-4
Discriminate message authentication code and one way hash
13 Evaluate BTL-5
function.
14 Show how SHA is more secure than MD5. Apply BTL-3
15 List any three hash algorithm. Remember BTL-1
16 Formulate how digital signature is different from conventional. Create BTL-6
Give any two.
17 Define CMAC. Remember BTL-1
18 Compare MD5 and SHA algorithm. Analyse BTL-4
19 Illustrate the design objectives of HMAC. Apply BTL-3
20 Classify the approaches of digital signature. Apply BTL-3
PART - B
(i)Assess where hash functions are used? (6)
1 (ii)Explain the characteristics are needed in secure hash Evaluate BTL-5
function? (7)

(i) Describe digital signature algorithm.(7)


2 (ii) Express how signing and verification is done using DSS. Remember BTL-1
(6)

STUDENTSFOCUS.COM
(i) Explain the process of deriving eighty 64-bit words from
1024 bits for processing of a single blocks and also discuss
3 single round function in SHA-512 algorithm. (7) Evaluate BTL-5
(ii)Conclude the values of W16, W17, W18 and W19in the
above question (6)
(i) What is Digital Signature? Explain how it is created at the
4 sender end and retrieved at receiver end. (6) Understand BTL-2
(ii) Differentiate digital signature from digital certificate. (7)
(i)Describe HMAC algorithm in detail. (7)
5 (ii)Explain the classification of authentication function in Understand BTL-2
detail. (6)
(i)Compare the features of SHA and MD5 algorithm(7)
6 (ii)Discuss about the objectives of HMAC and its security Create BTL-6
features. (6)
Describe the MD5 message digest algorithm with necessary
7 Analyse BTL-4
block diagrams. (13)
(i)Illustrate simple hash function and birthday attack. (7)
8 Apply BTL-3
(ii) Compare HMAC and CMAC. (6)
Explain in detail ElGamal Public key cryptosystems with an
9 Remember BTL-1
example. (13)
10 Describe Secure hash Algorithm in detail. (13) Remember BTL-1
11 Summarize CMAC algorithm and its usage.(13) Understand BTL-2
12 Discuss about Authentication protocols. (13) Understand BTL-2
Explain in detail
13 (i) message authentication code(6) and Understand BTL-2
(ii) the requirements of MAC.(7)
(i)Enumerate the properties of Hash Function.(7)
14 (ii)Describe the authentication protocol and list its limitations, Analysing BTL-4
how the limitations overcome. (6)

PART - C
Integrate the entire MAC process in detail and also explain the
1 (i) Establishment of Shared Secret,(7) Create BTL-6
(ii) Inability to Provide Non-Repudiation(8)

2 Discriminate the security of hash functions and MACs (15) Evaluate BTL-5

Recommend any one method of efficient implementation of Evaluate BTL-5


3
HMAC. (15)

With a neat flowchart, design MD5 processing of a single 512


4 Create BTL-6
bit block.(15)

STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : CS6701- Cryptography and Network Security
SEM / YEAR: VII/IV

UNIT IV - SECURITY PRACTICE & SYSTEM SECURITY


Authentication applications – Kerberos – X.509 Authentication services – Internet Firewalls
for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls –
Firewall designs – SET for E-Commerce Transactions. Intruder – Intrusion detection system
– Virus and related threats – Countermeasures – Firewalls design principles – Trusted
systems – Practical implementation of cryptography and security.
PART - A
Q.No Questions BT Level Competence
Differentiate host based intrusion detection system and
1 Analyse BTL-4
network based intrusion detection system.
2 Evaluate the design goals of firewalls. Evaluate BTL-5
3 Illustrate when the certificates are revoke in X.509. Apply BTL-3
4 Pointout commonly used firewalls from threats of security. Analyse BTL-4
5 Define Worm and Zombie. Remember BTL-1
6 Differentiate spyware and virus. Apply BTL-3
Assume a client C wants to communicate with a server S
7 Analyse BTL-4
using Kerberos protocol. Infer how can it be achieved?
8 Demonstrate intruder? Apply BTL-3
What are the advantages of intrusion detection system over
9 Remember BTL-1
firewall?
10 Define: SET Remember BTL-1
11 Define virus. Specify the types of viruses? Understand BTL-2
12 Give the uses of application level gateway? Understand BTL-2
13 Define firewall. Remember BTL-1
14 What is Kerberos? What are the uses? Understand BTL-2
15 What do you mean by trusted systems? Understand BTL-2
16 List 4 requirements were defined by Kerberos. Remember BTL-1
17 List the classes of Intruders. Remember BTL-1
18 Mention the limitations of firewalls. Evaluate BTL-5
19 Generalize the role of Ticket Granting Server in inter realm Create BTL-6
operations of Kerberos?
20 Summarize the purpose of X.509 standard? Understand BTL-2
PART - B

1 (i)What are the requirements of Kerberos? (7) Create BTL-6


(ii)Explain about Kerberos version 4. (6)
(i) Explain the Firewall design principles. (7)
2 Analyse BTL-4
(ii) Explain firewalls and how they prevent intrusions. (6)

STUDENTSFOCUS.COM
(i)Explain viruses?(3)
3 Evaluate BTL-5
(ii)Evaluate the virus related threats and the counter
measures. (10)
4 Illustrate the three common types of firewalls with Remember BTL-1
diagrams. (13)
5 Explain Secure Electronic Transaction with neat diagram. Remember BTL-1
(13)
(i)Express trusted system? (3)
6 (ii)Explain the basic concept of data access control in Understand BTL-2
trusted systems? (10)
(i) Discuss the architecture of distributed intrusion detection
7 system with the necessary diagrams. (7) Apply BTL-3
(ii) Demonstrate the implementation of cryptography and
security. (6)
(i) Discuss the role of intrusion detection system? What are
the three benefits that can be provided by the intrusion
detection system? (6) Understand
8 BTL-2
(ii) Discuss the architecture of distributed intrusion
detection system with the necessary diagrams. (7)
Illustrate the following
Apply BTL-3
(i) statistical anomaly detection and (7)
9 & &
(ii) rule based intrusion detection system (6) Analyse BTL-4
(i)Explain the roles of the different servers in Kerberos
protocol. How does the user get authenticated to the
10 different servers?(6) Understand BTL-2
(ii) Discuss how does the encryption key is generated from
password in Kerberos? (7)
(i) Illustrate the various measures that may be used for
11 intrusion detection. (7) Apply BTL-3
(ii) Illustrate trusted systems. (6)

12 Explain how kerberos apply the authentication dialog for Apply BTL-3
obtaining services from another realm. (13)
(i) Discover the participants of SET system, and explain in
13 detail. (7) Apply BTL-3
(ii) Illustrate the Trojan Horse Defence in trusted system.
(6)
14 Describe the different types of firewalls and its Remember BTL-1
configuration in detail. (13)
PART -C
Prepare a summary on the significant types of virus
1 categories. (15) Create BTL-6

Integrate how does a screened host architecture for


2 firewalls differ from a screened subnet firewall architecture? Create BTL-6
(15)
Support with an example, how a user’s certificate is
3 obtained from another certification authority in X.509 Evaluate BTL-5
scheme. (15)
4 Assess the firewall design principle, characteristics and Evaluate BTL-5
capabilities of firewalls (15)

STUDENTSFOCUS.COM
VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK
SUBJECT : CS 6701- Cryptography and Network Security
SEM / YEAR: VII/IV

UNIT V - E-MAIL, IP & WEB SECURITY


E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing
keys privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good
Privacy-S/MIME. IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header-
Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE
Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client
authentication-PKI as deployed by SSL Attacks fixed in v3- Exportability-Encoding-Secure
Electronic Transaction (SET).
PART - A
Q.No Questions BT Level Competence
1 What is dual signature? What it is purpose? Understand BTL-2
2 Summarize the services provided by PGP. Understand BTL-2
3 Define S/MIME. Remember BTL-1
4 Tabulate the fields and draw the header format for an Remember
ISAKMP message. BTL-1
5 Analyse the protocols used to provide IP security? Analyse BTL-4
6 Quote the applications of IP Security. Remember BTL-1
7 What is meant by SET? What are the features of SET? Understand BTL-2
8 Analyse why R64 conversion is useful for email generation? Analyse BTL-4
9 List the steps involved in SET Transactions. Remember BTL-1
10 Define the email compatibility function in PGP. Remember BTL-1
11 Describe tunnel mode in IP security. Understand BTL-2
12 List the elements of MIME. Remember BTL-1
13 Why does PGP generate a signature before applying Create
compression? BTL-6
14 Illustrate services are provided by IPSec? Apply BTL-3
15 Give the expansion of SPI and describe its features. Understand BTL-2
16 Define replay attack? Remember BTL-1
17 Compare transport mode and tunnel mode. Evaluate BTL-5
18 Identify the purposes of SSL alert protocol. Remember BTL-1
19 Why does ESP apply a padding field? Apply BTL-3
20 Give the reason for using PGP. Understand BTL-2
PART - B
(i) 1 Summarize the message generation process with suitable Evaluate BTL-5
(ii) diagram. (13)
(i) Summarize the services provided by PGP.(5)
2 (ii)Discuss the threats faced by an e-mail and explain its Understand BTL-2
security requirements to provide a secure e-mail service.(8)

STUDENTSFOCUS.COM
(i)Describe about the PKI. (7)
3 Remember BTL-1
(ii)Identify the fields in ISAKMP and explain it.(6)

(i)Discuss about the authentication header of IP. (7)


4 Understand BTL-2
(ii)Summarize encapsulating security payload of IP (6)
(i)Evaluate the different protocols of SSL.(8)
5 Evaluate BTL-5
(ii)Explain Handshake protocol in detail. (5)
(i)Explain IPSec protocols in detail .(6)
6 Create BTL-6
(ii) Tabulate the applications and advantages of IPSec. (7)
7 Describe the phases of Internet key exchange in detail. (13) Remember BTL-1

(i)Analyse the Cryptographic algorithm used in S/MIME. (7)


8 Analyse BTL-4
(ii)Explain how PKI is deployed by SSL (6)

(i)What is PGP? Show the message format of PGP(6)


9 Apply BTL-3
(ii)Illustrate the key rings and its significance in PGP. (7)

(i)Label the fields in IP security authentication header and


explain the functions of each field. (5)
10 Remember BTL-1
(ii)Identify transport mode and tunnel mode authentication in
IP? (8)
(i)Demonstrate secure Electronic Transaction with neat
diagram.(7)
11 (ii)Discover how ESP is applied to both transport and tunnel Apply BTL-3
modes in IP? (6)
(i)Differentiate transport modes and tunnel mode encryption
in IPsec. (8)
12 Understand BTL-2
(ii)Discuss about handshake protocol in SSL with neat
diagram. (5)
(i)How does IPSec ESP provides transport and Tunnel Mode
13 operation? (5) Analyse BTL-4
(ii)Explain with a neat sketch. (8)
(i)What is the need for security in IP networks? (5)
14 Remember BTL-1
(ii)Describe the IPv6 authentication header. (8)

PART - C
Compose how does PGP provide authentication and
1 confidentiality for email services and for file transfer Create BTL-6
applications? (15)
(i)Formulate Security Association? (7)
2 (ii)Invent the parameters that identify the Security Create BTL-6
Association. (8)
(i)Assess the main problem with IPV4 that IPV6 addresses (7)
3 (ii)Decide the factors combined to cause the exhaustion of Evaluate BTL-5
IPV4(8)

4 Deduce the overall function of TLS/SSL. (15) Evaluate BTL-5

The Transport Layer Security (TLS), and Secure


Socket Layer (SSL) protocols’ main purpose is to
provide the following.

STUDENTSFOCUS.COM

You might also like