0% found this document useful (0 votes)
2 views

CSS Assignments 2

The document outlines the course structure for the Cryptography and System Security subject for the academic year 2024-25, detailing course outcomes and assignment questions. It covers key topics such as digital certificates, hash functions, RSA algorithms, network security vulnerabilities, and malicious code recognition. The assignment aims to assess students' understanding and application of cryptographic techniques and network security principles.

Uploaded by

krishna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSS Assignments 2

The document outlines the course structure for the Cryptography and System Security subject for the academic year 2024-25, detailing course outcomes and assignment questions. It covers key topics such as digital certificates, hash functions, RSA algorithms, network security vulnerabilities, and malicious code recognition. The assignment aims to assess students' understanding and application of cryptographic techniques and network security principles.

Uploaded by

krishna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF COMPUTER ENGINEERING

Class/Sem./Div : TE/ VI/ (A&B) Academic Year : 2024-25

Subject Name :Cryptography and System Security Subject Code : CSC602

Submission Date : 05/04/2025

Course Outcomes:

CO1 Understand system security goals and concepts, classical encryption techniques and acquire
fundamental knowledge on the concepts of modular arithmetic and number theory

CO2 Understand, compare and apply different encryption and decryption techniques to solve
problems related to confidentiality and authentication

CO3 Apply different message digest and digital signature algorithms to verify integrity and
achieve authentication and design secure applications

CO4 Understand network security basics, analyse different attacks on networks and evaluate the
performance of firewalls and security protocols like SSL, IPSec, and PGP

CO5 Analyse and apply system security concept to recognize malicious code

Assignment No. 2

Q.N Question BL
CSC602.3: Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications
2 Draw and describe X.509 digital Certificate format.
3 Explain the properties of Hash? Explain MD5 in detail.
4 Compare SHA-1 and MD5.
5 List the benefits of MAC over message digest. compare HMAC and CMAC.
6 Elaborate the sign and verification process of the RSA algorithm.
In the RSA system the public key (E,N) of user A is defined as (7,33) and
the public key of user B is ( 13,221).
Implement RSA digital signature algorithm to find the private keys of user
A and user B.
User A wishes to send the message ‘C’ to user B . Examine the message
signing and verification process using RSA digital signature algorithm.
CSC602.4: Understand network security basics, analyse different attacks on networks
and evaluate the performance of firewalls and security protocols like SSL, IPSec, and
PGP
7 Discuss TCP/IP Vulnerabilities in detail.
8 What is Denial of Service attack? Elaborate different types of DoS attack.
9 Describe all phases of SSL handshake protocol in detail.
10 How does ESP header guarantee confidentiality and integrity of packet
payload? What is an authentication header (AH)? How does it protect
against replay attack?
11 Explain Intrusion detection in detail.
CSC602.5: Analyse and apply system security concept to recognize malicious code
12 Write short note on
1.​ Buffer overflow
2.​ Trojan Horse
3.​ SQL Injection
13 How does PGP achieve confidentiality and authentication in emails?

Subject Incharge

You might also like