0% found this document useful (0 votes)
113 views2 pages

East West Institute of Technology: (An Autonomous Institute Under VTU)

The document outlines two assignments for the course 'Cryptography & Network Security' at East West Institute of Technology, detailing submission deadlines and requirements. Each assignment includes various questions related to cryptography concepts, algorithms, and security measures, along with their respective marks and cognitive levels. Students must submit their assignments by specified deadlines to avoid receiving a zero grade.

Uploaded by

shubhac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views2 pages

East West Institute of Technology: (An Autonomous Institute Under VTU)

The document outlines two assignments for the course 'Cryptography & Network Security' at East West Institute of Technology, detailing submission deadlines and requirements. Each assignment includes various questions related to cryptography concepts, algorithms, and security measures, along with their respective marks and cognitive levels. Students must submit their assignments by specified deadlines to avoid receiving a zero grade.

Uploaded by

shubhac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

EAST WEST INSTITUTE OF TECHNOLOGY

(An Autonomous Institute under VTU)


Assignment-1
Dear Students,

All are instructed to write all the questions and answers in assignment book(Maintain uniformity).
Submit Assignment-1 on or before 22nd April 2025 by 3:00pm. Those who fail to submit before dead line will be awarded zero.

Dept. of CSE-IOT,CyS,BCT, Academic Year: 2024– 25/ EVEN


Course Title: Cryptography & Network Security Course Code: BCY602 Sem: 6
Q No. Question Marks RBT CO

1 (a) Describe the network security model with a a neat diagram. 5 L1 CO1
Using Playfair cipher method for the following:
(b) 7 L2 CO2
Keyword: “Computer” Plaintext:”parrot”
2 (a) Compare and contrast the difference between symmetric and asymmetric cryptography 4 L1 CO1
Using Hill Cipher to encipher and decipher the message “Hi Hello”. Use the Key DCFH
(b) 8 L2 CO2
3 Demonstrate the working of Fiestel Cipher structure for encryption with the help of a neat
(a) 10 L1 CO2
diagram.Also explain its parameters
(b) Discuss single round of DES algorithm with a neat diagram. 10 L1 CO2
4 (a) Demonstrate PRNG algorithms 5 L1 CO1
5 Explain vernam and Vigenere cipher. 8 L2 CO1
6 Describe block cipher design principles. 6 L1 CO1
7 Explain DES construction in detail with a neat diagram 10 L2 CO2
8 What is the cipher text if the plain text is 63 and the public key is 13? Use the RSA 10 L3 CO2
algorithm.
9 Let q=353 and g=3. Xa=97, Xb=233. Use Diffie Hellman Key exchange 10 L3 CO2
algorithm to find Ya, Yb and Secret key K.
10 What are the practical issues related to RSA? 5 L1 CO2
11 What is meant by key management? Explain Key Distribution scenarios with KDC 8 L2 CO3
12 Explain the use of Control Vector Encryption and Decryption for 8 L2 CO3
controlling key usage. Mention its advantages.
13 List and explain the four general categories of schemes for the distribution 6 L2 CO3
of public keys.
14 Explain Symmetric Key Distribution Using Asymmetric Encryption with a 6 L2 CO3
solution for man in the middle attack
15 Write X.509 Formats. How is an X.509 certificate revoked? 8 L2 CO3
EAST WEST INSTITUTE OF TECHNOLOGY
(An Autonomous Institute under VTU)
Assignment-2
Submit Assignment-1 on or before 08 May 2025 by 3:00pm. Those who fail to submit before dead line will be awarded zero.
th

Dept. of CSE-IOT,CyS,BCT, Academic Year: 2024– 25/ EVEN


Course Title: Cryptography & Network Security Course Code: BCY602 Sem: 6
Q No. Question Marks RBT CO

1 (a) Explain the sequence how the man-in-middle attack take place in Diffie-Hellman Key 8 L2 CO2
exchange with a neat daigram
Describe elliptic curve cryptography with its
(b) 6 L3 CO2
equation
2 (a) Define hash function.Illustrate message authentication in hash function with a neat diagram. 8 L1 CO3
Explain Transport layer security.
(b) 8 L2 CO4
3 Explain IP security and its policy
(a) 7 L2 CO5
(b) Describe how the key is exchanged in internet. 10 L1 CO5
4 Explain the Kerberos Version 4 diagram with message Exchanges. 8 L2 CO3
5 With a neat diagram, explain the PKIX Architectural Model 7 L2 CO4
6 With a neat diagram explain t h e transmission and reception of PGP messages 8 L1 CO4
7 Short note on 10 L1 CO4
1) MIME transfer encodings 2) native and canonical form
3) S/MIME functionality 4) S/MIME messages.
8 Explain the Ipsec Architecture 6 L1 CO4

You might also like