0% found this document useful (0 votes)
58 views2 pages

CNS Question Paper

This document is an examination paper for the B. Tech III Year II Semester in Cryptography and Network Security at Jawaharlal Nehru Technological University Hyderabad. It consists of two parts: Part A, which is compulsory and contains 10 questions worth 25 marks, and Part B, which includes 5 units where students must answer one question from each unit for a total of 50 marks. The questions cover various topics in cryptography, security protocols, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views2 pages

CNS Question Paper

This document is an examination paper for the B. Tech III Year II Semester in Cryptography and Network Security at Jawaharlal Nehru Technological University Hyderabad. It consists of two parts: Part A, which is compulsory and contains 10 questions worth 25 marks, and Part B, which includes 5 units where students must answer one question from each unit for a total of 50 marks. The questions cover various topics in cryptography, security protocols, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

B. Tech III Year II Semester Examinations, February - 2025

CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE, IT)

Time: 3 hours Max. Marks: 75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A.

Part B consists of 5 Units. Answer any one full question from each unit.

Each question carries 10 marks and may have a, b, c as sub-questions.

PART - A

(25 Marks)

a) Define cryptanalysis and its importance. [2]


b) Explain the concept of message integrity. [3]
c) What are the weaknesses of simple substitution ciphers? [2]
d) How does RSA ensure confidentiality in communications? [3]
e) What is the purpose of a hash function in security? [2]
f) Discuss the advantages of symmetric key cryptography. [3]
g) Why is key management crucial in cryptography? [2]
h) Explain the role of nonce in authentication protocols. [3]
i) What are the components of an IPSec framework? [2]
j) Briefly describe the role of VPNs in network security. [3]

PART - B

(50 Marks)

1. a) Explain the classification of security attacks.


b) Describe the Caesar cipher with an example. [5+5]

OR

2. a) How does DES encryption work? Explain with an example.


b) Compare DES and AES algorithms. [5+5]
OR

3. a) Discuss the working principle of RSA algorithm.


b) Explain the concept of digital signatures and their applications. [5+5]

OR

4. a) What are the different types of firewalls? Explain each.


b) Discuss the security features of TLS and SSL protocols. [5+5]

OR

5. a) Explain the importance of VPN in enterprise security.


b) Describe how IPSec works in transport and tunnel modes. [5+5]

You might also like