0% found this document useful (0 votes)
424 views4 pages

Assignment: CO1 CO2 CO3 CO4

This document contains an assignment for a Cryptography, Network Security and Cyber Law course. It lists 37 questions related to the course content covering topics such as cryptography techniques, network security designs, cyber attacks, cyber laws and digital signatures. The questions are mapped to course outcomes focusing on understanding fundamental concepts, analyzing cryptographic algorithms, discussing key management and network security solutions, and describing network security threats and countermeasures. Students are required to answer the questions which involve explanations, illustrations, calculations, listings and comparisons related to the various topics.

Uploaded by

Prakash Hegde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
424 views4 pages

Assignment: CO1 CO2 CO3 CO4

This document contains an assignment for a Cryptography, Network Security and Cyber Law course. It lists 37 questions related to the course content covering topics such as cryptography techniques, network security designs, cyber attacks, cyber laws and digital signatures. The questions are mapped to course outcomes focusing on understanding fundamental concepts, analyzing cryptographic algorithms, discussing key management and network security solutions, and describing network security threats and countermeasures. Students are required to answer the questions which involve explanations, illustrations, calculations, listings and comparisons related to the various topics.

Uploaded by

Prakash Hegde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

DAYANANDA SAGAR ACADEMY OF TECHNOLOGY AND MANAGEMENT

Affilated to Visvesvaraya Technological University,Belagavi & Approved by AICTE,New Delhi)


Opp. Art of Living, Udayapura, Kanakapura Road, Bangalore- 560082
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING
(Accredited 3 years by NBA, New Delhi (Validity: 26-07-2018 to 30-06-2021)

ASSIGNMENT
Subject: Cryptography, Network Security And Cyber Law Sub Code: 17CS61

Faculty: Dr. Vagdevi S and Karthik S A Class: VI Sem

CO1 Understand the fundamental concepts of Cyber attacks, cryptographic techniques


and defence strategies through mathematical model.
CO2 Analyse secret and public key cryptography with various algorithms and its
applications.
CO3 Discuss key management issues and solutions, authentication mechanisms and
network security designs at different layers using available secure solutions.
CO4 Describe the various network security threats, counter measures and cyber laws.

1. Write short notes on i. Motives of cyber attacker ii. Common attacks


(10 Marks Dec/Jan 2019) –
CO1
2. List and explain the various vulnerabilities with common cyber attacks
(10 Marks Dec/Jan 2019) - ) – CO1
3. Explain in detail defense strategies and techniques
(10 Marks, June/July 2018)– CO1
4. a. Write a short note on secret and public key cryptography.
(06 Marks, NS)-CO1
b. Discuss types of attacks w.r.t cryptographic algorithm. (04 Marks, NS)-CO1
5. a. List the guiding principles of security. (05 Marks, June/July 19)-
CO1
b. Calculate the value of x using Chinese remainder theorem by given below data
:N=210 , n1= 5 , n2=6 , n3=7 , x1=3 , x2=5 , x3=2. (05 Marks, June/July 19)-
CO1
6. Write the extended Euclidean algorithm, with an example.
(10 Marks, June/July 19)-
CO1
7. a. Explain the Vigenere Cipher and the Hill Cipher techniques with illustration.
(06 Marks, June/July 19)-CO1
b. With neat diagram, explain Fiestel structure. (04 Marks, June/July 19)-
CO1
8. a. What is RSA? Explain Key generation steps. (06 Marks, Dec/Jan 19 )-
CO1
b. Briefly explain the practical issues of RSA algorithm.
(04 Marks, June/July 19)-
CO1
9. Discuss different modes of operation related to DES, (10 Marks, NS)
10. Given p=3 ,q=11, and M=5 .explain encryption and decryption using RSA algorithm
(10 Marks, June/July 2018 ) –CO2
11. Encrypt the plaintext “ CRYPTOGRAPHY” using hill cipher technique with key
matrix k= 9 4
CO2
[ ]
5 7
(10 Marks, NS)-

12. Explain public key cryptography standard (PKCS). (10 Marks, Dec/Jan 19)–CO2
13. What is hash function? List and explain the properties of cryptographic hash.
(10 Marks, Dec/Jan 19)–
CO2
14. With neat diagram, explain generic cryptographic hashing.
(10 Marks, June/July 2018)–CO2
15. Describe with neat diagram Diffie- Hellman key exchange.
(10 Marks, June/July 2018, Dec/Jan 19)–CO2
16. Explain the Man — In — the Middle attack on Diffie — Hellman key exchange, with
neat diagram. (10 Marks, June/July 19)–
CO2
17. What is digital certificate? Explain the fields of X.509 Digital certificate.
(10 Marks, June/July 2018)- CO3
18. Explain the one-way Authentication w.r.t
i. Password –based Authentication
ii. Certificate –based Authentication (10 Marks, Dec/Jan 19)-
CO3
19. Distinguish between shared-key Authentication and Asymmetric-key authentication.
(10 Marks, June/July 2018)- CO3
20. What is Kerberos? Describe in detail a simple authentication dialogue in Kerberos
(10 Marks, June/July 2018, Dec/Jan 19)- CO3
21. Explain the different Public Key Infrastructure (PKI) architecture
(10 Marks, June/July19)- CO3
22. Describe the Mutual authentication using a shared secret.
(10 Marks, June/July19)- CO3
23. Explain in detail the authentication and key agreement in 802.11i authentication
(10 Marks, Dec/Jan 19)-CO4
24. Explain how 802.11 provides message confidentiality and integrity
(10 Marks, June/July 2018)-CO4
25. Describe the prevention measures taken for the DDOS attack prevention at different
levels. (10 Marks, June/July 2018)-
CO4
26. Explain in detail DDOS detection and prevention (10 Marks, Dec/Jan 19)-CO4

27. a. Explain the practical issues of the firewall. (06 Marks, Dec/Jan 19 )-CO4
b. Explain the Authentication and Master Session Key exchange in 802.11i.
(04 Marks, June/July 19)-CO4
28. a. Explain the types of Intrusion Detection System. (05 Marks, June/July19)-CO4
b. Explain the Basic functionalities of the Firewall. (04 Marks, Dec/Jan 2019)-
CO4
29. What is the aim and objectives of IT act. (10 Marks, Dec/Jan 19)-
CO4
30.Explain different provisions of IT act. (10 Marks, NS)
31. Explain the process of issuing digital signature certificate and revocation of digital
signature certificate by certificate authority.
(10 Marks, June/July 2018, Dec/Jan 19)-CO4
32. Explain the process of attribution, acknowledgement and dispatch of electronic
records. (10 Marks, June/July 2018)-CO4
33. Discuss OFFENES defined as per IT Act 2000. (10 Marks, Dec/Jan 19)-
CO4
34. Briefly explain Penalties and Adjudication in IT Act. (10 Marks, June/July 19)-CO4
35. Discuss the provisions of the IT act as regards to the following:
i. legal Recognition of Electronics records
ii. Authentication of electronics records (10 Marks, Dec/Jan 19)-CO4
36. Explain Digital Signature Certificates. (10 Marks, June/July 19)
CO4
37. List any eight functions of the Controller. (10 Marks, June/July 19)-CO4

You might also like