EAST WEST INSTITUTE OF TECHNOLOGY
(An Autonomous Institute under VTU)
Assignment-1
Dear Students,
All are instructed to write all the questions and answers in assignment book(Maintain uniformity).
Submit Assignment-1 on or before 22nd April 2025 by 3:00pm. Those who fail to submit before dead line will be awarded zero.
Dept. of CSE-IOT,CyS,BCT, Academic Year: 2024– 25/ EVEN
Course Title: Cryptography & Network Security Course Code: BCY602 Sem: 6
Q No. Question Marks RBT CO
1 (a) Describe the network security model with a a neat diagram. 5 L1 CO1
Using Playfair cipher method for the following:
(b) 7 L2 CO2
Keyword: “Computer” Plaintext:”parrot”
2 (a) Compare and contrast the difference between symmetric and asymmetric cryptography 4 L1 CO1
Using Hill Cipher to encipher and decipher the message “Hi Hello”. Use the Key DCFH
(b) 8 L2 CO2
3 Demonstrate the working of Fiestel Cipher structure for encryption with the help of a neat
(a) 10 L1 CO2
diagram.Also explain its parameters
(b) Discuss single round of DES algorithm with a neat diagram. 10 L1 CO2
4 (a) Demonstrate PRNG algorithms 5 L1 CO1
5 Explain vernam and Vigenere cipher. 8 L2 CO1
6 Describe block cipher design principles. 6 L1 CO1
7 Explain DES construction in detail with a neat diagram 10 L2 CO2
8 What is the cipher text if the plain text is 63 and the public key is 13? Use the RSA 10 L3 CO2
algorithm.
9 Let q=353 and g=3. Xa=97, Xb=233. Use Diffie Hellman Key exchange 10 L3 CO2
algorithm to find Ya, Yb and Secret key K.
10 What are the practical issues related to RSA? 5 L1 CO2
11 What is meant by key management? Explain Key Distribution scenarios with KDC 8 L2 CO3
12 Explain the use of Control Vector Encryption and Decryption for 8 L2 CO3
controlling key usage. Mention its advantages.
13 List and explain the four general categories of schemes for the distribution 6 L2 CO3
of public keys.
14 Explain Symmetric Key Distribution Using Asymmetric Encryption with a 6 L2 CO3
solution for man in the middle attack
15 Write X.509 Formats. How is an X.509 certificate revoked? 8 L2 CO3
EAST WEST INSTITUTE OF TECHNOLOGY
(An Autonomous Institute under VTU)
Assignment-2
Submit Assignment-1 on or before 08 May 2025 by 3:00pm. Those who fail to submit before dead line will be awarded zero.
th
Dept. of CSE-IOT,CyS,BCT, Academic Year: 2024– 25/ EVEN
Course Title: Cryptography & Network Security Course Code: BCY602 Sem: 6
Q No. Question Marks RBT CO
1 (a) Explain the sequence how the man-in-middle attack take place in Diffie-Hellman Key 8 L2 CO2
exchange with a neat daigram
Describe elliptic curve cryptography with its
(b) 6 L3 CO2
equation
2 (a) Define hash function.Illustrate message authentication in hash function with a neat diagram. 8 L1 CO3
Explain Transport layer security.
(b) 8 L2 CO4
3 Explain IP security and its policy
(a) 7 L2 CO5
(b) Describe how the key is exchanged in internet. 10 L1 CO5
4 Explain the Kerberos Version 4 diagram with message Exchanges. 8 L2 CO3
5 With a neat diagram, explain the PKIX Architectural Model 7 L2 CO4
6 With a neat diagram explain t h e transmission and reception of PGP messages 8 L1 CO4
7 Short note on 10 L1 CO4
1) MIME transfer encodings 2) native and canonical form
3) S/MIME functionality 4) S/MIME messages.
8 Explain the Ipsec Architecture 6 L1 CO4