0% found this document useful (0 votes)
9 views4 pages

PDF&Renditio

This document outlines the Mini Model Examination for the CCS354 - Network Security course at Adhiparasakthi Engineering College for the academic year 2024-2025. It includes details about the examination structure, such as the distribution of marks across different parts and a series of questions covering various topics in network security. The examination is scheduled for April 7, 2025, and consists of multiple choice and descriptive questions related to cryptography, attacks, and security protocols.

Uploaded by

K.VENKATESH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views4 pages

PDF&Renditio

This document outlines the Mini Model Examination for the CCS354 - Network Security course at Adhiparasakthi Engineering College for the academic year 2024-2025. It includes details about the examination structure, such as the distribution of marks across different parts and a series of questions covering various topics in network security. The examination is scheduled for April 7, 2025, and consists of multiple choice and descriptive questions related to cryptography, attacks, and security protocols.

Uploaded by

K.VENKATESH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Om Sakthi

Adhiparasakthi Engineering College


Melmaruvathur – 603 319
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year - ODD (2024- 2025)
REGULATION -2021
MINI MODEL EXAMINATION
SET-02
CCS354 – NETWORK SECURITY
Year & SEM: III & VI Max. Marks: 100
Date: 07-04-2025 Time : 12:50PM-3:50 PM
Part – A (10*2 =20 Marks)
Q. No Questions BTL CO’S PO'S
1. Difference Between Active and Passive attack. 1 2 2
2. What is meant by Cryptography? 1 1 1
3. Write the Disadvantages of Public key algorithm. 1 2 2
4. Differentiate conventional encryption and public-key encryption. 1 1 1
5. Define message digest. 1 1 1
6. List the counter measures for replay attacks. 1 1 1
7. Write the main elements of X.509 certificate. 1 2 2
8. Name the four requirements defined by kerberos 1 1 1
9. What entities constitute a full service in kerberos environment? 1 2 2
10. What are the benefits of PKI? 1 2 2
Part – B (5*13 = 65 Marks)
11(A) i)Use Fermat’s theorem to find a number between 0 and 72 with a 2 1 1
congruent to 9794 modulo 73. (7)
ii)Describe the basic arithmetical and logical functions used in SHA. (6)
(OR)
i) Discuss the types of attacks that are handled by message authentication.
11(B) (6)
3 1 1

ii) Discuss the steps involved in Digital Signature Algorithm (DSA) with
examples.(7)
12(A) What are the different types of Attacks? Explain. 3 1 1
(OR)
How Hash function algorithm is designed? Explain their features and
12(B) Properties. 4 1 1

i) Describe the schemes that are widely used for the distribution of public
13(A) keys with examples. (7) 3 1 1

ii) Elaborate the key elements of PKIX architectural model with a neat
diagram. (6)
(OR)
Explain the network security model and its important parameters with a
13(B) neat block diagram. 4 2 2

14(A) i) Explain the steps involved in Kerberos protocol for providing 3 2 2


authentication service. (6)
ii) Identify the protocol used for the following one-way authentication
technique based on asymmetric encryption. And explain the protocol. (7)
A->B: IDA
B->A:R1
A->B: E(PRu, R₁)
(OR)
Explain Kerberos system , its Technology and Kerberos version 4?
14(B) 4 1 1
i)Difference between Kerberos and SSL (5)
15(A) ii)Difference between Symmetric key Cryptography and Asymmetric key
3 2 2

Cryptography (8)
(OR)
i)Explain brify about Mutual Authentication and Password based
15(B) Authentication .(10) 4 1 1
ii) why is user authentication important?
Part C (1*15=15 Marks)
i)Perform encryption and decryption using RSA algorithm where p = 3 q
16(A) = 11 epsilon = 7 and M = 5 (10) 4 2 2
ii) Write the properties of Hash Functions. (2)
iii)What are the features of Cryptography? (3)

(OR)
16(B) The following authenticated key agreement protocol is given: 3 2 2

1 : A -> B / gx mod p
2 : B -> A / gy mod p, E h ( S_{B}(g ^ y) mod p, g mod p))
3 : A -> B / E_{k} * (S_{A}(g ^ x mod p, g ^ y mod p))

Assume that the parties have agreed on a (g. p) pair for Diffie-Hellman
key exchange, that each user has RSA keys for digital signatures and that
they have agreed on a block cipher E for use in subsequent encryption.
Further, kis the agreed secret key and S_{A} and S_{B} denotes As and
B:s signature operations respectively.

(i) Describe the details (as a list) As and B:s actions at receipt of messages
2 and 3 and what beliefs they have at that stage. (6)

(ii) Are A and B successfully authenticated to each other after protocol


run? (9)

You might also like