0% found this document useful (0 votes)
108 views2 pages

Cryptography SEE 2018

This document is an exam for a Cryptography and Network Security course, assessing students' knowledge across the five course outcomes. It contains two parts - Part A with short answer questions worth 3 to 10 marks each, and Part B with longer answer or calculation questions worth 6 to 10 marks each. The questions cover topics like symmetric and asymmetric encryption algorithms, hashing, digital signatures, public key infrastructure, email security protocols, web security, firewalls and intrusion detection. Students are asked to explain concepts, analyze examples, compare approaches and discuss methodologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views2 pages

Cryptography SEE 2018

This document is an exam for a Cryptography and Network Security course, assessing students' knowledge across the five course outcomes. It contains two parts - Part A with short answer questions worth 3 to 10 marks each, and Part B with longer answer or calculation questions worth 6 to 10 marks each. The questions cover topics like symmetric and asymmetric encryption algorithms, hashing, digital signatures, public key infrastructure, email security protocols, web security, firewalls and intrusion detection. Students are asked to explain concepts, analyze examples, compare approaches and discuss methodologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Subject Code: MCA 451 USN:

JSS Mahavidyapeetha
JSS Science and Technology University
JSS Technical Institution’s Campus, Mysuru–570006

IV Semester MCA Degree


Semester End Examination - May 2018
Branch: MCA Name of the paper Setter: Dr. H.R. Chennamma

CRYPTOGRAPHY AND NETWORK SECURITY

Duration: 3 Hours Time: 9.30 A.M. to 12.30 P.M. Max. Marks: 100
Date: 31st May 2018 Day: Thursday

Course Outcomes (CO):


CO-1: Explore the need for computer security concepts.
Understand the principles and techniques of symmetric key encryption and public
CO-2:
key encryption.
CO-3: Understand the requirement and implementation of Hash and MAC.
CO-4: Appreciate PGP and S/MIME for E-mail security.
Understand Web Security, Secure Electronic Transaction, Intruder detection and
CO-5:
Firewalls

Note: Answer both PART-A and PART-B


PART-A
Q. CO Cognitive Question Marks
No Domain

With the aid of a functional schematic, explain the 7


1a CO1 Knowledge
general model for Network Security.

1b CO1 Knowledge Give an overview of OSI Security Architecture. 3

Write a block diagram and explain each step in a round


2 CO2 Comprehension 10
of DES.

3a CO3 Comprehension Discuss the requirements of Massage Authentication. 5

Explain, how Encryption helps to authenticate a


3b CO3 Synthesis 5
message?

Explain operational description of PGP for email


4 CO4 Comprehension 10
security.

Define SSL Session and SSL Connection. Briefly


5 CO5 Knowledge explain the parameters that define SSL Session state and 10
SSL Connection state.

Page 1 of 2
Subject Code: MCA 451 USN:

PART-B
Briefly explain methodology and significance of Play Fair
6 CO1 Application Cipher and encrypt the message “CRYPTOGRAPHY” by 10
using “LARGEST” as a keyword.
OR
Encrypt the message “SJCE MYSURU” using Hill
7 CO1 Application Cipher with the key [9 6; 5 7]. Show your calculations 10
and result.

In a public-key system using RSA, you intercept the


8a CO2 Application ciphertext C = 14 sent to a user whose public key is e = 7, 6
n = 33. What is the plaintext M?
Synthesis What are the requirements for the use of a public-key
8b CO2 certificate scheme? 4

OR
Explain AES Key Expansion Algorithm with the help of
9a CO2 Knowledge 8
a diagram.
Write the differences between stream cipher and block
9b CO2 Comprehension cipher. 2

10 CO3 Knowledge Explain the structure and algorithm of HMAC. 10

OR

11a CO3 Comprehension Discuss the security of Hash Function. 7

Knowledge & What is digital signature and how it is used in message


11b CO3 3
Synthesis authentication?

12 CO4 Knowledge Explain RFC 5322 framework and list its limitations? 10

OR

13a CO4 Knowledge Write a short note on IPSec Documents. 4

13b CO4 Evaluation Compare two operational modes of IPSec. 6

Briefly describe the sequence of events that are required


14 CO5 Comprehension 10
for a transaction in a SET System.
OR
What is a firewall? Explain the three common types of
15 CO5 Knowledge 10
firewalls.

Page 2 of 2

You might also like