0% found this document useful (0 votes)
120 views

Operational Description and Message Format of PGP

This document contains an internal test for the subject "cryptography and network security". It includes 15 questions divided into two parts - Part A contains 10 short answer questions worth 2 marks each and Part B contains 5 long answer questions worth 16 marks each. The questions cover topics like Kerberos, PGP, SSL, digital signatures, hash functions, authentication protocols, IPsec, and PGP. It provides the question number, topic, reference year and marks for each question.

Uploaded by

senthilvl
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views

Operational Description and Message Format of PGP

This document contains an internal test for the subject "cryptography and network security". It includes 15 questions divided into two parts - Part A contains 10 short answer questions worth 2 marks each and Part B contains 5 long answer questions worth 16 marks each. The questions cover topics like Kerberos, PGP, SSL, digital signatures, hash functions, authentication protocols, IPsec, and PGP. It provides the question number, topic, reference year and marks for each question.

Uploaded by

senthilvl
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

2.

With a neat flowchart, describe MD5 processing of single


512 block.
[nov/dec 2013] (8)
(or)
(b).1. Enumerate the properties of hash function.
[nov/dec 2014]

Branch : ECE
Date & Time: 10.09.2015 &1.15 to 4.15 PM
Semester: VII
Max.mark:100
Sub.code &Title: EC2035 cryptography and network security

1.
2.
3.

4.
5.
6.
7.

INTERNAL TEST-II
PART -A (10*2=20)
(Answer the entire question)
List the importance features of Kerberos Version 5. [nov/dec 2014]
What are the important services offered by PGP?
[nov/dec 2013]
Why does an ESP include the padding field?
[nov/dec 2013]
Write down the steps involved in SSL required protocol.
Draw an X.509 message format.
Give the authentication requirements.
[nov/dec 2013]
Distinguish between entity and message authentication.
[nov/dec 2013]

8. Compare direct and arbitrated digital signature.


9. Differentiate MD5, SHA-1, RIPEMD-160.
10. Define the classes of message authentication function.

(8)

2. Describe the denning authentication protocols and list its


limitations, how the limitations overcome.[nov/dec 2013] (8)
12. (a).Explain in detail about the diagram of SHA-512 processing of
a single 1024 bit blocks.
[nov/dec 2014] (16)
(or)
(b).Explain about HMAC and RIPEMD
(16)
13. (a).With neat block diagram, explain the services of SSL
protocols.
[nov/dec 2013] (16)
(or)
(b).Explain the concept and types of digital signature.
(16)
14. (a). What is Kerberos? Explain how it provides authentication
services in two approaches.
[nov/dec 2014] (16)
(or)
(b).Explain in detail about concept and functionality of S/MIME.
[nov/dec 2014]

(16)

15. (a).Explain the benefit, applications and operational modes of


IP security.
[nov/dec 2013] (16)
(or)
(b).Explain the Operational Description and message format of PGP.
[nov/dec 2013] (16)

PART- B (5*16=80 marks)


(Answer the entire question)
11. (a).1. Explain in detail in message authentication code and its
requirements.
[nov/dec 2013]

(8)

Faculty I/C

HOD/ECE

You might also like