0% found this document useful (0 votes)
22 views2 pages

Cryptography and Network Security 20CSC30

The document outlines the examination structure for the Cryptography and Network Security course at Chaitanya Bharathi Institute of Technology, including details on Part-A and Part-B questions. Part-A consists of five questions worth 3 marks each, while Part-B has five questions worth 9 marks each, with internal choices provided. Topics cover various aspects of cryptography, network security, and related algorithms and protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Cryptography and Network Security 20CSC30

The document outlines the examination structure for the Cryptography and Network Security course at Chaitanya Bharathi Institute of Technology, including details on Part-A and Part-B questions. Part-A consists of five questions worth 3 marks each, while Part-B has five questions worth 9 marks each, with internal choices provided. Topics cover various aspects of cryptography, network security, and related algorithms and protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Code No.

: 20CSC30
CHAITANYA BHARATHI INSTITUTE OF TECHNOLOGY (Autonomous)
B.E. (CSE, CET) VII Sem (Main) Examination Nov – Dec 2023
Cryptography and Network Security
Time: 3 Hours Max Marks: 60
Note: Answer ALL questions from Part-A & Part –B (Internal Choice) at one place in the
same order
Part - A
(5Q X 3M = 15 Marks)
M CO BT
1 Define steganography. (3) 1 1
2 Discuss about Knapsack Algorithm. (3) 1 2
3 What are the benefits of Digital Signature? (3) 2 1
4 Explain the IEEE 802.11Wireless LAN. (3) 5 2
5 List the advantages of Authentication Header Protocol. (3) 4 1
Part – B
(5Q X 9M = 45 Marks)
M CO BT
6 (a) List and briefly define categories of Security Services and attacks. (5) 1 2
(b) Discuss about the transposition ciphers with examples. (4) 1 2
(OR)
7 (a) Describe pervasive and specific security mechanisms in detail. (5) 1 2
(b) Distinguish strong Symmetric and Asymmetric Cryptography? (4) 1 4

8 (a) Enumerate in detail about the steps in Blowfish Algorithm and explain (5) 1 4
the process of each round with a neat diagram.
(b) Explain the Key Expansion process in AES. (4) 1 2
(OR)
9 (a) Summarize the public key cryptographic principles. Explain RSA (5) 2 2
algorithm for given example, where p = 3 and q = 11.
(b) Enumerate Diffie-Hellman Key exchange for encryption and (4) 2 4
decryption with suitable examples.

10 (a) Explain Message Authentication Requirements and what are the (5) 2 2
attacks related to message communication?
(b) Discuss about the message exchange mechanism in Kerberos version4. (4) 2 2
(OR)
11 (a) List the main features of SHA-512 cryptographic hash function. What (5) 4 4
kind of compression function is used in SHA-512?
(b) What is HMAC function? Summarize the design objectives of HMAC. (4) 4 2

12 (a) What is SSL? Explain about SSL record protocol format. (5) 3 2
(b) List and briefly define the parameters that define an SSL session (4) 3 1
connection, Session State.
(OR)
Page 1 of 2
Code No.: 20CSC30
13 (a) Explain the security constraints of IEEE 802.11i Wireless LAN in (5) 5 2
detail.
(b) Enumerate the functionalities of Secure Shell. (4) 3 4

14 (a) List and explain the PGP services and explain how PGP message (5) 3 2
generation is done with a neat diagram.
(b) Explain IP security architecture and also explain basic combinations of (4) 5 2
security associations with a neat diagram.
(OR)
15 (a) Write general format of PGP message with a pictorial representation (5) 3 4
and explain. How PGP used for E-mail security?
(b) Describe the functionalities of Internet Key Exchange Protocol. (4) 3 2

******

Page 2 of 2

You might also like