0% found this document useful (0 votes)
6 views1 page

CNS Mid 2 QB

The document contains a series of questions related to cryptography and network security, covering topics such as man-in-the-middle attacks on Diffie-Hellman key exchange, symmetric-key distribution methods, hash functions, digital signatures, Kerberos, PGP messages, SSL protocols, and IPSec services. It seeks explanations, evaluations, and differentiations of various security concepts and protocols. The questions aim to assess understanding of secure communication methods and their implementations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

CNS Mid 2 QB

The document contains a series of questions related to cryptography and network security, covering topics such as man-in-the-middle attacks on Diffie-Hellman key exchange, symmetric-key distribution methods, hash functions, digital signatures, Kerberos, PGP messages, SSL protocols, and IPSec services. It seeks explanations, evaluations, and differentiations of various security concepts and protocols. The questions aim to assess understanding of secure communication methods and their implementations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1 Explain how does a man-in-the middle attack affect the Diffie - Hellman key

exchange protocol?
2 Two users A and B want to establish a secret key using the Diffie - Hellman key
exchange protocol using p = 23, g = 7, x = 3 and y = 6. Determine the values of A, B
and the secret key.
3 Explain various symmetric-key distribution methods.
4 Define hash function? List the variants in SHA by explaining SHA-512 in detail.
5 Discuss different MIME data types and list the differences between MIME and
S/MIME.
6 Describe digital signature algorithm and show how signing and verification is
done using Digital signature scheme?
7
What is Kerberos? Explain how it provides authenticated service.
8 Write the general format of PGP Message. Explain the PGP message
generation from User A to User B with no compression.
9
How do you provide security at application layer?
10 Evaluate the different protocols of SSL. Explain Handshake protocol in
detail. Describe the SSL Architecture in detail with a neat diagram?
11
Explain Secure Electronic Transaction with neat diagram?
12 What are the services provided by digital signatures? Explain if the following
are provided
i) Source Authentication
ii) Data Integrity
iii) Source Non-Repudiation
13
Write and explain TLS functions and alert codes of Transport Layer Security.
14
With a neat sketch explain the IPSec scenario and IPSec Services.
15
Differentiate between MAC and Hash function..
16
Write a short notes on Authentication header and ESP.
17 Differentiate between message authentication and one-way hash function.
b) Write the difference between MD5 and SHA
18
Discuss about the objectives of HMAC and its security features.
19
Differentiate between SSL connection and SSL session.

You might also like