CNS Mid 2 QB
CNS Mid 2 QB
exchange protocol?
2 Two users A and B want to establish a secret key using the Diffie - Hellman key
exchange protocol using p = 23, g = 7, x = 3 and y = 6. Determine the values of A, B
and the secret key.
3 Explain various symmetric-key distribution methods.
4 Define hash function? List the variants in SHA by explaining SHA-512 in detail.
5 Discuss different MIME data types and list the differences between MIME and
S/MIME.
6 Describe digital signature algorithm and show how signing and verification is
done using Digital signature scheme?
7
What is Kerberos? Explain how it provides authenticated service.
8 Write the general format of PGP Message. Explain the PGP message
generation from User A to User B with no compression.
9
How do you provide security at application layer?
10 Evaluate the different protocols of SSL. Explain Handshake protocol in
detail. Describe the SSL Architecture in detail with a neat diagram?
11
Explain Secure Electronic Transaction with neat diagram?
12 What are the services provided by digital signatures? Explain if the following
are provided
i) Source Authentication
ii) Data Integrity
iii) Source Non-Repudiation
13
Write and explain TLS functions and alert codes of Transport Layer Security.
14
With a neat sketch explain the IPSec scenario and IPSec Services.
15
Differentiate between MAC and Hash function..
16
Write a short notes on Authentication header and ESP.
17 Differentiate between message authentication and one-way hash function.
b) Write the difference between MD5 and SHA
18
Discuss about the objectives of HMAC and its security features.
19
Differentiate between SSL connection and SSL session.