Cryptography and Network Security 20CSC30
Cryptography and Network Security 20CSC30
: 20CSC30
CHAITANYA BHARATHI INSTITUTE OF TECHNOLOGY (Autonomous)
B.E. (CSE, CET) VII Sem (Main) Examination Nov – Dec 2023
Cryptography and Network Security
Time: 3 Hours Max Marks: 60
Note: Answer ALL questions from Part-A & Part –B (Internal Choice) at one place in the
same order
Part - A
(5Q X 3M = 15 Marks)
M CO BT
1 Define steganography. (3) 1 1
2 Discuss about Knapsack Algorithm. (3) 1 2
3 What are the benefits of Digital Signature? (3) 2 1
4 Explain the IEEE 802.11Wireless LAN. (3) 5 2
5 List the advantages of Authentication Header Protocol. (3) 4 1
Part – B
(5Q X 9M = 45 Marks)
M CO BT
6 (a) List and briefly define categories of Security Services and attacks. (5) 1 2
(b) Discuss about the transposition ciphers with examples. (4) 1 2
(OR)
7 (a) Describe pervasive and specific security mechanisms in detail. (5) 1 2
(b) Distinguish strong Symmetric and Asymmetric Cryptography? (4) 1 4
8 (a) Enumerate in detail about the steps in Blowfish Algorithm and explain (5) 1 4
the process of each round with a neat diagram.
(b) Explain the Key Expansion process in AES. (4) 1 2
(OR)
9 (a) Summarize the public key cryptographic principles. Explain RSA (5) 2 2
algorithm for given example, where p = 3 and q = 11.
(b) Enumerate Diffie-Hellman Key exchange for encryption and (4) 2 4
decryption with suitable examples.
10 (a) Explain Message Authentication Requirements and what are the (5) 2 2
attacks related to message communication?
(b) Discuss about the message exchange mechanism in Kerberos version4. (4) 2 2
(OR)
11 (a) List the main features of SHA-512 cryptographic hash function. What (5) 4 4
kind of compression function is used in SHA-512?
(b) What is HMAC function? Summarize the design objectives of HMAC. (4) 4 2
12 (a) What is SSL? Explain about SSL record protocol format. (5) 3 2
(b) List and briefly define the parameters that define an SSL session (4) 3 1
connection, Session State.
(OR)
Page 1 of 2
Code No.: 20CSC30
13 (a) Explain the security constraints of IEEE 802.11i Wireless LAN in (5) 5 2
detail.
(b) Enumerate the functionalities of Secure Shell. (4) 3 4
14 (a) List and explain the PGP services and explain how PGP message (5) 3 2
generation is done with a neat diagram.
(b) Explain IP security architecture and also explain basic combinations of (4) 5 2
security associations with a neat diagram.
(OR)
15 (a) Write general format of PGP message with a pictorial representation (5) 3 4
and explain. How PGP used for E-mail security?
(b) Describe the functionalities of Internet Key Exchange Protocol. (4) 3 2
******
Page 2 of 2