CSS Assignments 2
CSS Assignments 2
Course Outcomes:
CO1 Understand system security goals and concepts, classical encryption techniques and acquire
fundamental knowledge on the concepts of modular arithmetic and number theory
CO2 Understand, compare and apply different encryption and decryption techniques to solve
problems related to confidentiality and authentication
CO3 Apply different message digest and digital signature algorithms to verify integrity and
achieve authentication and design secure applications
CO4 Understand network security basics, analyse different attacks on networks and evaluate the
performance of firewalls and security protocols like SSL, IPSec, and PGP
CO5 Analyse and apply system security concept to recognize malicious code
Assignment No. 2
Q.N Question BL
CSC602.3: Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications
2 Draw and describe X.509 digital Certificate format.
3 Explain the properties of Hash? Explain MD5 in detail.
4 Compare SHA-1 and MD5.
5 List the benefits of MAC over message digest. compare HMAC and CMAC.
6 Elaborate the sign and verification process of the RSA algorithm.
In the RSA system the public key (E,N) of user A is defined as (7,33) and
the public key of user B is ( 13,221).
Implement RSA digital signature algorithm to find the private keys of user
A and user B.
User A wishes to send the message ‘C’ to user B . Examine the message
signing and verification process using RSA digital signature algorithm.
CSC602.4: Understand network security basics, analyse different attacks on networks
and evaluate the performance of firewalls and security protocols like SSL, IPSec, and
PGP
7 Discuss TCP/IP Vulnerabilities in detail.
8 What is Denial of Service attack? Elaborate different types of DoS attack.
9 Describe all phases of SSL handshake protocol in detail.
10 How does ESP header guarantee confidentiality and integrity of packet
payload? What is an authentication header (AH)? How does it protect
against replay attack?
11 Explain Intrusion detection in detail.
CSC602.5: Analyse and apply system security concept to recognize malicious code
12 Write short note on
1. Buffer overflow
2. Trojan Horse
3. SQL Injection
13 How does PGP achieve confidentiality and authentication in emails?
Subject Incharge