0% found this document useful (0 votes)
66 views14 pages

CNS Question Bank

Uploaded by

stylishvenky334
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views14 pages

CNS Question Bank

Uploaded by

stylishvenky334
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

7.

DETAILED LECTURE PLAN (2023-24)


IV CSE B

NO OF
UNIT PROPOSED DELIVERY
S.No TOPICS TO BE COVERED CLASSES
NO DATE REFERENCE METHOD ACTUAL DATE REMRKS
REQUIRED

Module-1
Security Concepts
1 I 31-07-2023 Introduction 1 T1,R1 C&T

02-08-2023 The need for security PPT


T1,R1
2 I Security approaches 1
Principles of security

04-08-2023 Types of Security attacks : Pasive attacks T1,R1 C&T


3 I Active attacks 1
T1,R1 C&T

4 I 07-08-2023 1 T1,R1 PPT


Security services
5 I 09-08-2023 1 T1,R1 C&T
Security Mechanisms
6 I 10-08-2023 A model for NetworkSecurity 1 T1,R1 PPT

12-08-2023 Cryptography Conceptsand C&T


7 I 1 T1,R1
Techniques:
Introduction
8 I 14-08-2023 substitution techniques T1,R1 C&T
2
9 I 16-08-2023 T1,R1 C&T

10 I 17-08-2023 transposition techniques T1,R1 C&T


2
11 I 18-08-2023 T1,R1 C&T

12 I 19-08-2023 encryption anddecryption 1 T1,R1 C&T

13 I 21-8-2023 symmetric and asymmetric key 1 T1,R1 C&T


cryptography
14 I 23-8-2023 steganography 1 T1,R1 C&T

Module-II Symmetric cryptography

17
15 II 24-9-2023 Block Cipher principles 1 T1,R1 C&T

16 II 2525-9-2023 DES 1 T1,R1 C&T

17 II 26-8-2023 AES 1 T1,R1 C&T

18 II 28-8-2023 .1 T1,R1 C&T


Blowfish
19 II 30-8-2023 RC5 1 T1,R1 C&T

20 II 31-8-2023 IDEA 1 T1,R1 C&T

21 II 2-9-2023 1 T1,R1 C&T


Block cipher operation
22 II 4-9-2023
Stream ciphers 1 T1,R1 C&T

23 II 6-9-2023
RC4 1 T1,R1 C&T

24 II 9-9-2023 Principles of public key 1 T1,R1 C&T


cryptosystems
25 II 11-9-2023 RSA algorithm 1 T1,R1 C&T

26 II 13-9-2023 Elgamal Cryptography 1 T1,R1 PPT

27 II 14-9-2023 Diffie- Hellman KeyExchange, 1 T1,R1 C&T


Algorithm
Knapsack algorithm C&T
28 II 1 T1,R1
15-9-2023

Module-III Cryptographic Hash function

III Message Authentication C&T


29 T1,R1
16-9-2023
2

30
III Message Authentication T1,R1
PPT
20-9-2023

31 III 22-9-2023 Secure Hash Algorithm(SHA-512) T1,R1 C&T


2
32 III 25-9-2023 Secure Hash Algorithm(SHA-512) T1,R1 C&T

33 III 30-9-2023 Message authentication T1,R1 C&T


codes: 2
34 III 4-10-2023 Message authentication T1,R1 PPT
codes:
35 III 9-10-2023 Authentication 1 T1,R1 C&T
requirements
36 III 11-10-2023 HMAC 1 T1,R1 C&T

18
37 III 13-10-2023 CMAC 1 T1,R1 C&T

38 III 16-10-2023
Digital signatures T1,R1 C&T

39 III
16-10-2023
Digital signatures 2 T1,R1 C&T

40 III Elgamal Digital SignatureScheme T1,R1 C&T


19-10-2023

III Key Management and C&T


41 21-10-2023 1 T1,R1
Distribution:
42 III Symmetric Key Distribution Using 1 T1,R1 C&T
30-10-2023
Symmetric Encryption
III C&T
43 Symmetric Key 1 T1,R1
1-11-2023 Distribution using Asymmetric
Encryption
44 III Distribution of Public 1 T1,R1 C&T
2-11-2023
Keys
45 III Kerberos 1 T1,R1 C&T
3-11-2023

46 III X.509 AuthenticationService, 1 T1,R1 C&T


4-11-2023

47 III 6-11-2023 Public–Key Infrastructure 1 T1,R1 C&T

Module –IV Transport layer security

48 IV 8-11-2023 Web security 1 T1,R1 C&T


considerations

49 IV 10-11- Secure Socket Layer T1,R1 C&T


2023
2
50 IV 11-11-23 Security T1,R1 C&T
Transport
51 IV 13-11-23 HTTP 1 T1,R1 C&T

52 IV 15-11-23 Secure Shell (SSH) 1 T1,R1 C&T

IV 16-11-23 Wireless NetworkSecurity: C&T


53 1 T1,R1
Wireless
Security,
54 IV 17-11-23 Mobile Device Security 1 T1,R1 C&T

55 IV 18-11-23 IEEE802.11 Wireless 1 T1,R1 C&T


LAN

19
56 IV 20-11-23 IEEE802.11i Wireless 1 T1,R1 C&T
LAN Security
Module-V E-mail Security

57 V 25-11-23 Pretty Good Privacy 1 T1,R1 C&T

58 V 27-11-23 S/MIME 1 T1,R1 C&T

59 V 29-11-23 IPSecurity: IP Security 1 T1,R1 C&T


overview,
60 V 1-12-23 Authentication Header 1 T1,R1 C&T

V Encapsulating security C&T


61 2-12-23 1 T1,R1
Payload, Combining security
associations
V Internet Key Exchange, Secure C&T
62 4-12-23 1 T1,R1
Multiparty
Calculation
63 V 6-12-23 , Virtual Elections 1 T1,R1 C&T

64 V 7-12-23 Single sign On T1,R1 C&T


1

V Secure Inter-branch 1 C&T


65 8-12-23 T1,R1
Payment Transactions, Cross site
Vulnerability
Total Hours 65

20
LESSON PLAN: IV CSE C

NO OF
UNIT PROPOSED DELIVERY
S.No TOPICS TO BE COVERED CLASSES
NO DATE REFERENCE METHOD ACTUAL DATE REMRKS
REQUIRED

Module-1
Security Concepts
1 I 31-07-2023 Introduction 1 T1,R1 C&T

3-8-2023 The need for security PPT


T1,R1
2 I Security approaches 1
Principles of security

4-8-2023 Types of Security attacks : Pasive T1,R1 C&T


3 I attacks 1
Active attacks T1,R1 C&T

4 I 4-8-2023 1 T1,R1 PPT


Security services
5 I 5-08- 1 T1,R1 C&T
2023 Security Mechanisms
6 I 7-08- A model for NetworkSecurity 1 T1,R1 PPT
2023
7-08- C&T
2023 Cryptography Conceptsand
7 I 1 T1,R1
Techniques:
Introduction
8 I 10-08- T1,R1 C&T
2023 substitution techniques
2
9 I T1,R1 C&T
11-08-
2023
10 I 12-08- T1,R1 C&T
2023 transposition techniques
2
11 I 14-08- T1,R1 C&T
2023

12 I 14-08- 1 T1,R1 C&T


2023 encryption anddecryption

13 I 17-08- symmetric and asymmetric key 1 T1,R1 C&T


2023
cryptography
14 I 18-08- 1 T1,R1 C&T
2023 steganography

Module-II Symmetric cryptography

15 II Block Cipher principles 1 T1,R1 C&T


21-08-2023

16 II 24-08-2023 DES 1 T1,R1 C&T

17 II 25-08-2023 AES 1 T1,R1 C&T

21
18 II 26-08-2023 .1 T1,R1 C&T
Blowfish
19 II 28-08-2023 RC5 1 T1,R1 C&T

20 II 01-09-2023 IDEA 1 T1,R1 C&T

21 II 01-09-2023 1 T1,R1 C&T


Block cipher operation
22 II 02-09-2023 Stream ciphers 1 T1,R1 C&T

23 II 04-09-2023 RC4 1 T1,R1 C&T

24 II 07-09-2023 Principles of public key 1 T1,R1 C&T


cryptosystems
25 II 08-09-2023 RSA algorithm 1 T1,R1 C&T

26 II 09-09-2023 Elgamal Cryptography 1 T1,R1 PPT

11-09-2023 Diffie- Hellman Key C&T


27 II 1 T1,R1
Exchange,
Algorithm
15-09-2023 Knapsack algorithm C&T
28 II 1 T1,R1

Module-III Cryptographic Hash function

III 16-09-2023 Message Authentication C&T


29 T1,R1

2
III 18-09-2023 Message Authentication PPT
30 T1,R1

31 III Secure Hash Algorithm(SHA- T1,R1 C&T


21-09-2023
512) 2
32 III 22-09-2023 Secure Hash Algorithm(SHA- T1,R1 C&T
512)
33 III 23-09-2023 Message authentication T1,R1 C&T
codes: 2
34 III Message authentication T1,R1 PPT
25-09-2023
codes:
35 III Authentication 1 T1,R1 C&T
25-09-2023
requirements
36 III
28-09-2023 HMAC 1 T1,R1 C&T

37 III 30-09-2023 CMAC 1 T1,R1 C&T

38 III 09-10-2023 Digital signatures 2 T1,R1 C&T

22
39 III 12-10-2023 Digital signatures T1,R1 C&T

40 III 13-10-2023 Elgamal Digital Signature T1,R1 C&T


Scheme
III 13-10-2023 Key Management and C&T
41 1 T1,R1
Distribution:
III Symmetric Key Distribution C&T
42 14-10-2023 1 T1,R1
Using Symmetric
Encryption
III 16-10-2023 C&T
43 Symmetric Key 1 T1,R1
Distribution using
Asymmetric Encryption
44 III 19-10-2023 Distribution of Public 1 T1,R1 C&T
Keys
III 20-10-2023 Kerberos C&T
45 1 T1,R1

III 20-10-2023 X.509 Authentication C&T


46 1 T1,R1
Service,
30-10-2023 Public–Key Infrastructure C&T
47 III 1 T1,R1

Module –IV Transport layer security

48 IV Web security 1 T1,R1 C&T


03-11-2023
considerations
49 IV 03-11-2023 Secure Socket Layer T1,R1 C&T
2
50 IV 04-11-2023 Security T1,R1 C&T
Transport
51 IV 06-11-2023 HTTP 1 T1,R1 C&T

52 IV 10-11-2023 Secure Shell (SSH) 1 T1,R1 C&T

IV 11-11-2023 Wireless Network C&T


53 1 T1,R1
Security: Wireless
Security,
54 IV 13-11-2023 Mobile Device Security 1 T1,R1 C&T

55 IV 16-11-2023 IEEE802.11 Wireless 1 T1,R1 C&T


LAN
56 IV 17-11-2023 IEEE802.11i Wireless 1 T1,R1 C&T
LAN Security
Module-V E-mail Security 23-

57 V 18-11-2023 Pretty Good Privacy 1 T1,R1 C&T

23
58 V 20-11-2023 S/MIME 1 T1,R1 C&T

59 V 20-11-2023 IPSecurity: IP Security 1 T1,R1 C&T


overview,
60 V 23-11-2023 Authentication Header 1 T1,R1 C&T

V Encapsulating security C&T


61 24-11-2023 1 T1,R1
Payload, Combining security
associations
V 27-11- Internet Key Exchange, Secure C&T
62 1 T1,R1
2023 Multiparty
Calculation
63 V 30-11- , Virtual Elections 1 T1,R1 C&T
2023
64 V 01-12- Single sign On T1,R1 C&T
1
2023
V 01-12- Secure Inter-branch 1 C&T
65 T1,R1
2023 Payment Transactions, Cross site
Vulnerability
Total Hours 65

24
8.Unit wise Question Bank
UNIT-I

S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define cryptanalysis and cryptology. L1 CO1 PO1,PO6
2 What is masquerade? L1 CO1 PO1,PO6
3 Define passive attack and active attack. L1 CO1 PO1,PO6
4 Define Denial of service. L1 CO1 PO1,PO6
5 What is steganography? Mention few techniques in it. L1 CO1 PO1,PO6
6 Mention few mono-alphabetic and poly-alphabetic ciphers. L1 CO1 PO1,PO6
7 Define Threat and attack. List out what are the attacks that canbe L1 CO1 PO1,PO6
performed in network.
8 Convert the Given Text “CRYPTOGRAPHY” into cipher text L3 CO1 PO1,PO6
using Rail fence Technique.
9 Define security attack, security mechanism and security services. L1 CO1 PO1,PO6
10 Define the two basic building blocks of encryption techniques L1 CO1 PO1,PO6
Part– B(Long Answer Questions)
11 a) Explain in detail about OSI security architecture. L2 CO1 PO1,PO6
b) Explain classical encryption techniques (Steps involved in each L2 CO1 PO1,PO6
encryption technique like Caesar cipher, playfair cipher, hill
cipher, vigenere cipher, one time pad cipher, rail fence, etc)
12 a) Explain about steganography, transposition cipher. L2 CO1 PO1,PO6
b) Write short notes on security mechanisms L6 CO1 PO1,PO6
13 a) Explain about substitution ciphers in detail with an example. L2 CO1 PO1,PO6
b) What are the goals of security? Explain in detail about security L1 CO1 PO1,PO6
Services?
14 a) what is meant by security attack? Explain various types of L1 CO1 PO1,PO6
security attacks.
b) UNIT–
Draw a matrix that shows the relationship between security L2 CO1 PO1,PO6
mechanisms and attacks. II
15 a) Symmetric keyciphers
Explain various transposition cipher, with
Assysmmetric cipher
an example L2 CO1 PO1,PO6

b) Explain any three substitution ciphers with an example. L2 CO1 PO1,PO6


16 a) Define Cryptography.What is the need of CIA Triad. L1 CO1 PO1,PO6
b) What are the different levels of losses that occur without CIA L1 CO1 PO1,PO6
Triad.

25
UNIT_II
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define symmetric key cryptography and public key cryptography. L1 CO2 PO3
2 Define Euler’s totient function (used in RSA algorithm). L1 CO2 PO3
3 Why do we need Diffie Hellman algorithm? L2 CO2 PO3
4 Mention the various types of cryptanalytic attack. L1 CO2 PO3
5 What are the operations used in AES? L1 CO2 PO3
6 What are the various approaches to attacks the RSA algorithm? L1 CO2 PO3
7 How to find primitive root with an example. L3 CO2 PO3
8 What primitive operations are used in RC4 L1 CO2 PO3
9 Compare stream cipher with block cipher with example L3 CO2 PO3
10 Define Euler’s theorem and its application. L1 CO2 PO3
Part– B(Long Answer Questions)
11 a) Discuss various steps of IDEA algorithm. L3 CO2 PO3
b) Explain UNIT–
Diffie-Hellman
III key exchange algorithm in detail. L2 CO2 PO3
Cryptographic hash functions
a)
Explain the steps involved in knapsack algorithm with an L2 CO2 PO3
12 example.
b) Explain in detail about the steps involved in DES. L2 CO2 PO3
13 a) Explain Elgamal algorithm in detail. L2 CO2 PO3

b) Discuss different block cipher modes of operation L3 CO2 PO3


14 a) Explain in detail about the steps involved in Blowfish. L2 CO2 PO3
b) AES consists of four functions in three layers. Which of the L3 CO2 PO3
functions are primarily for confusion and which are primarily for
diffusion? Which of the layers are for confusion and which are for
diffusion? Justify your answers.
15 a) Explain the steps involved in RC4. L2 CO2 PO3
b) Explain RSA algorithm. And perform Encryption and Decryption L2 CO2 PO3
using RSA p=3 q=11 e=7 M=5
16 a) Explain RC5 algorithm L2 CO2 PO3
b) Differentiate Block cipher and Stream Cipher L4 CO2 PO3

UNIT-III
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 What is meant by Message Authentication? L1 CO3 PO2,PO3
2 List out the attack on MAC L1 CO3 PO2,PO3
3 Define Digital signature L1 CO3 PO2,PO3
4 What you meant by MAC L1 CO3 PO2,PO3
5 Differentiate Message Authentication Code and Hash function. L4 CO3 PO2,PO3
6 What are the two approaches of Digital Signature? L1 CO3 PO2,PO3
7 Define Hash function . L1 CO3 PO2,PO3
8 List out the different techniques of distributing the public key L1 CO3 PO2,PO3

26
9Define one way property, weak collision resistance and strong L1 CO3 PO2,PO3
collision resistance of hash function.
10 Define the classes of message authentication function. L1 CO3 PO2,PO3
Part– B(Long Answer Questions)
11 a) With the example, explain in detail about Secure Hash Algorithm L2 CO3 PO2,PO3

b) Explain in detail about HMAC and Digital Signature Standard L2 CO3 PO2,PO3
12 a) Give a brief note on basic uses of message authentication code. L3 CO3 PO2,PO3
b) Explain the process involved in message digest generation and L2 CO3 PO2,PO3
processing of single block in SHA512.
13 a) What is the purpose of digital signature? Explain its properties L1 CO3 PO2,PO3
and requirements.
b) Explain the requirements of digital signatures and also discuss L2 CO3 PO2,PO3
how problems related to digital signature are taken care by an
arbiter?
14 a) State and explain the different approaches to message L3 CO3 PO2,PO3
authentication
b) Explain the format of X.509v3 certificate and certificate L2 CO3 PO2,PO3
revocation list. Explain each in detail.
15 a) Explain about characteristics of hash functions L2 CO3 PO2,PO3
b) Explain briefly about Kerberos and give its requirements. L2 CO3 PO2,PO3
16 a) Explain in detail about Elgamal Digital signature scheme. L2 L2 PO2,PO3
b) Verify the signature with the Elgamal Digital signature of values L3 L5 PO2,PO3
q=19,α=10,XA=16,m=14,k=5.

UNIT-IV
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define transport and tunnel mode. L1 CO4 PO1,PO3
2 What are the benefits of mobile device security. L1 CO4 PO1,PO3
3 Mention the phases of the Handshake protocol. L1 CO4 PO1,PO3
4 Why do we need an anti replay service? L2 CO4 PO1,PO3
5 What is the use of the change cipher spec protocol? L1 CO4 PO1,PO3
6 What are the two characteristic of wired LAN that are not L1 CO4 PO1,PO3
inherent in wireless
7 What is the need pf padding in Encapsulating Security Payload L1 CO4 PO1,PO3
(ESP)?
8 What is security association? L1 CO4 PO1,PO3
9 Define the terms: connection and session. L1 CO4 PO1,PO3
10 How the security associations be combined? L3 CO4 PO1,PO3
Part– B(Long Answer Questions)
11 a) Briefly explain about transport layer security and Padding. L2 CO4 PO1,PO3
b) With a neat diagram, explain the operation of SSL and SSH L2 CO4 PO1,PO3
Record Protocol.
12 a) Differentiate SSL & TLS L4 CO4 PO1,PO3
b) Write a short notes on IEEE 802.11 i services. L6 CO4 PO1,PO3
13 a) Write a short notes on IEEE 802.11 i Phases of operation. L6 CO4 PO1,PO3
b) Explain in detail, the Handshake protocol in secure socket layer L2 CO4 PO1,PO3

27
14 a) Write a short note on Wireless LAN Security. L6 CO4 PO1,PO3
b) Write a short note on HTTPS. L6 CO4 PO1,PO3
15 a) What are the different types of mobile device security. Explain L1 CO4 PO1,PO3
each.
b) How does mobile device security work? L3 CO4 PO1,PO3
16 a) Explain in detail about SSL L2 CO4 PO1,PO3
b) What is the importance of providing Security for wireless LAN L1 CO4 PO1,PO3

UNIT-
V
Email security
S.No Questions BT CO PO
Part –A(Short Answer Questions)
Mention the services provided by the Pretty Good Privacy (PGP). L1 CO5 PO5,PO6
,PO7
2 What are the notations of PGP? L1 CO5 PO5,PO6
,PO7
3 What do you mean by IKE. L1 CO5 PO5,PO6
,PO7
4 Classify the intruders. L3 CO5 PO5,PO6
,PO7
5 How E-mail compatibility is performed? L3 CO5 PO5,PO6
,PO7
6 How the password files be protected? L3 CO5 PO5,PO6
,PO7
7 List out the limitations of secure multiparty computation. L1 CO5 PO5,PO6
,PO7
8 Mention the benefits of IPSec. L1 CO5 PO5,PO6
,PO7
9 Define cross site scripting vulnerability. L1 CO5 PO5,PO6
,PO7
10 Define different types of voting systems in virtual elections. L1 CO5 PO5,PO6
,PO7
Part– B(Long Answer Questions)
11 a) Name the protocols that provide security in IPSec. L2 CO5 PO5,PO6
,PO7
b) Write short notes on PGP. L6 CO5 PO5,PO6
,PO7
12 a) Explain in detail about IP Security Policy L2 CO5 PO5,PO6
,PO7
b) Explain how S/MIME differs form MIME L2 CO5 PO5,PO6
,PO7
13 a) What are the design goals for a firewall? Also mention its L1 CO5 PO5,PO6
Limitations ,PO7
b) List the five important features of IKE key determination L1 CO5 PO5,PO6
algorithm ,PO7
14 a) Write a short note on cross site scripting vulnerability. L6 CO5 PO5,PO6
,PO7
28
b) Explain secure inter branch payment transactions. L2 CO5 PO5,PO6
,PO7
15 a) Explain the secure multiparty calculation.. L2 CO5 PO5,PO6
,PO7
b) Write a short note on Single sign on. L6 CO5 PO5,PO6
,PO7
16 a) What are the features of IKE Key algorithm. L1 CO5 PO5,PO6
,PO7
b) Explain the voting systems in virtual elections. L2 CO5 PO5,PO6
,PO7

29
9. PREVIOUS END EXAM QUESTION PAPERS

30

You might also like