0% found this document useful (0 votes)
29 views2 pages

Assignment CNS

Cns

Uploaded by

madhavjani.ce21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

Assignment CNS

Cns

Uploaded by

madhavjani.ce21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Shri Sa’d Vidya Mandal Institute of Technology – Bharuch

Department of CE and IT
Subject (Code): Cryptography and Network Security (3161606)
Class : BE III (Semester VI) – IT

Unit 1
1. Define the following terms:
i. Confidentiality
ii. Authentication
iii. Availability
2. What do you mean by a security attack? Explain types of security attack.
3. Discuss the following terms in brief.
i. Encryption
ii. Plain text
iii. Cipher text
iv. Cryptography
v. Brute force attack
vi. Cryptanalysis
4. Write the difference(s) between block cipher and stream cipher?
5. Enlist the differences between Symmetric key encryption/decryption and Asymmetric key
encryption/decryption.
6. Find cipher text using Caeser cipher if plain text = COMPUTER ENGINEERING and key
K = 5. (Ignore space(s) between words)
7. Find cipher text using Playfair cipher if plain text= ENGINEERING and keyword is
INFORMATION
8. Find cipher text using Hill Cipher if plain text= ENGINEERING and keyword is {8, 11, 5,
7}.
9. Explain rail fence technique with depth = 4, find out cipher text for plain text = WE ARE
THE BEST IN ACADEMICS. (Ignore space(s) between words)
10. Write the difference(s) between polyalphabetic cipher and one time pad. Also mention two
difficulties we may face if we use one time pad for enciphering and deciphering.
11. Define (i) Group (ii) Ring (iii) Field
12. Write the Euclid’s algorithm and show the steps of Euclid’s algorithm to find
GCD(401,700).
13. Find out the greatest common divisor GCD of 96256 and 432.
14. Let p=11 and q=7, Then find multiplicative inverse of 13 modulo Φ(pq).

Unit 2
1. Write the differences between Stream Cipher and Block Cipher.
2. Only draw block diagram for DES encryption.
3. Elaborate single round of DES with neat diagram.
4. Discuss AES encryption with neat sketches.
5. Write the differences between DES and AES.

Unit 3
1. Write a short note on :
i. 2-DES with two keys
ii. 3-DES with three keys
2. Explain meet-in-the-middle attack for 3-DES with two keys.
3. Discuss block cipher operations with neat sketches.
Unit 4
1. Perform encryption and decryption using RSA algorithm for following: p=3;q=13,e=5;M=10.
2. Explain Diffie Hellman scheme with diagram. For Diffie-Hellman algorithm, two publically
known numbers are prime number 11 and primitive root of it is 2. A selects the random integer
9 and B selects 4. Compute the public key of A and B. Also compute common secret key.
3. Briefly explain the Diffie-Hellman key exchange with example.
4. Define Man in the middle attack.

Unit 5
1. Explain the following terms in brief:
i. Confidentiality
ii. Non-repudiation
iii. Access Control
2. Describe MAC? Explain HMAC algorithm in details.
3. Illustrate the overall operation of HMAC. Define the terms.
4. Explain the processing of a single block of SHA-1 algorithm in detail.

Unit 6
1. Describe MAC? Explain HMAC algorithm in details.
2. Illustrate the overall operation of HMAC. Define the terms.
3. Describe the principle of digital signature algorithm (DSA). Explain the signing and verifying
function in DSA.
4. What is message authentication? Explain the requirements of message authentication.

Unit 7
1. What is digital signature? Explain Elgamal digital signature scheme in detail.
2. Explain Schnorr Digital Signature Scheme.
3. Draw Generic Model of Digital Signature Process.

Unit 8
1. Define KDC? With the help of diagram explain how KDC do key distribution.
2. Explain Public key Infrastructure in security.
3. Explain X.509 authentication service.
4. Described briefly the Authentication process covered by X.509.

Unit 9
1. Draw and explain Kerberos protocol in details.
2. Justify the importance of Authentication in Security. Demonstrate the working of Kerberos
Version 4 Authentication Dialogue with detailed steps.
3. Explain the concept of Realm in Kerberos in brief.
4. What problem was Kerberos designed to address?

Unit 10
1. What is the purpose of HTTPS?
2. What is HTTPS? How it works?
3. Write a short note on Secure Socket Layer.
4. Justify the Importance of SSL Handshake Protocol with detailed explanation.
5. Demonstrate the working SSL Record Protocol.
6. What is SSH? How does SSH works?
7. Briefly explain web security threats.
8. Explain HAND SHAKE protocol in SSL.

You might also like