Lakshmi Narain College of Technology Excellence, Bhopal
Department of Computer Science and Engineering
VII-Semester
CS703 (A) Cryptography & Information Security
Assignment-I
1. What do mean by Cryptography, Explain the importance of it in current scenario of
communication?
2. Mention different types of Attacks.
3. Explain Fermat’s Little Theorem, give with an example?
4. Explain Data Encryption Standard (DES), give its function.
5. Give the implementation of Conventional Cryptography methods in details.
6. Explain various ty[pes Cryptography Algorithms?
Assignment-II
1. Explain Advanced Encryption Standard (AES) in details?
2. Differentiate between Public Key Cryptosystem and Private Key Cryptosystem.
3. How RSA signatures are designed.
4. Mention the statement of Chinese Remainder Theorem.
5. Explain the Primarily testing methods.
6. How Elliptic Curve Modulo a Prime can be implemented.
Assignment-III
1. What do you mean by Message Authentication, its function and why it is important?
2. Explain Message Authentication Code in details?
3. What is Hashing Function, Explain various hashing Function methods for data security.
4. Explain Cryptanalysis Time memory Trade-off Attack and Differential Cryptanalysis.
5. Explain Kerberos authentication system in detail.
Assignment-IV
1. Give the various types of Network Threats and how it can harm system.
2. How Firewalls are help in protecting data and give various types of Firewalls.
3. Mention different types of E mail attacks, and write the measures of email security.
4. Explain the working of IPSec, IP & IP version 6 Authentication.
5. Write notes on the following topics: Pretty Good Privacy (PGP), Encapsulation Security
Payload ESP, and Internet Key Exchange IKE.
6. How Web security can be maintained using Secure Electronic Transaction.
Assignment-V
1. Mention two Spoofing tools and Give their Pros and Cons.
2. Compare Vulnerabilities Scanning tools like Angry IP
3. Write note on Denial of Services tools like Jolt2, Bubonic.c, Panther2, FSMax.
4. Give comparative study of different Stego Detection Tool, and Trojans Detection Tools.
5. Write Short notes on STools, NetBios and Lan scanner tools.