0% found this document useful (0 votes)
178 views1 page

Subject: Cryptography, Network Security and Cyber Law Sub Code: 17CS61 Faculty: Dr. Vagdevi S and Karthik S A Class: VI Sem

This document contains the assignment questions for the subject Cryptography, Network Security And Cyber Law. It lists 24 questions related to cryptographic concepts like hash functions, Diffie-Hellman key exchange, digital certificates, authentication mechanisms including Kerberos, public key infrastructure and IPsec protocols. The questions are from previous years' exam papers and are aimed at evaluating students' understanding of secret and public key cryptography, key management issues and network security designs.

Uploaded by

Prakash Hegde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views1 page

Subject: Cryptography, Network Security and Cyber Law Sub Code: 17CS61 Faculty: Dr. Vagdevi S and Karthik S A Class: VI Sem

This document contains the assignment questions for the subject Cryptography, Network Security And Cyber Law. It lists 24 questions related to cryptographic concepts like hash functions, Diffie-Hellman key exchange, digital certificates, authentication mechanisms including Kerberos, public key infrastructure and IPsec protocols. The questions are from previous years' exam papers and are aimed at evaluating students' understanding of secret and public key cryptography, key management issues and network security designs.

Uploaded by

Prakash Hegde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ASSIGNMENT-2

Subject: Cryptography, Network Security And Cyber Law Sub Code: 17CS61
Faculty: Dr. Vagdevi S and Karthik S A Class: VI Sem
CO2 Analyse secret and public key cryptography with various algorithms and its
applications.
CO3 Discuss key management issues as well as solutions, authentication mechanisms
and network security designs at different layers using available secure solutions.

13. What is hash function? List and explain the properties of cryptographic hash.
(10 Marks, Dec/Jan 19)–CO2
14. a. With neat diagram, explain generic cryptographic hashing.
b. Briefly explain how cryptographic hash can be used to provide message integrity.
(10 Marks, June/July 2018)–CO2
15. Explain process of computing hash function using SHA-1 Algorithm
(10 Marks, June/July 2018)–CO2
16. Describe with neat diagram Diffie- Hellman key exchange.
(10 Marks, June/July 2018, Dec/Jan 19)–CO2
17. Explain the Man — In — the Middle attack on Diffie — Hellman key exchange, with
neat diagram. (10 Marks, June/July 19)–CO2
18. What is digital certificate? Explain the fields of X.509 Digital certificate.
(10 Marks, June/July 2018)- CO3
19. Explain the one-way Authentication w.r.t
i. Password –based Authentication
ii. Certificate –based Authentication (10 Marks, Dec/Jan 19)- CO3
20. Describe in detail shared secret-key Authentication and Asymmetric-key
authentication. (10 Marks, June/July 2018)- CO3
21. What is Kerberos? Describe in detail a simple authentication dialogue in Kerberos
(10 Marks, June/July 2018, Dec/Jan 19)- CO3
22. Explain the different Public Key Infrastructure (PKI) architecture.
(10 Marks, June/July19)- CO3
23. Explain Needham Schroeder protocol version – 1 and version-2
(10 Marks, Dec.2018/Jan 19)- CO3
24. a. Describe the IP Sec protocols Authentication [leader and Encapsulating
Security Pay load in transport mode. (05 Marks, June/July 19)- CO3
b. Explain Birthday attack.
(05 Marks, June/July 19)- CO3

You might also like