0% found this document useful (0 votes)
29 views3 pages

CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS

study hard

Uploaded by

S.Kamesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS

study hard

Uploaded by

S.Kamesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
Ree. No: [TT TT 1) Question Paper Code : 90426 B.E/BTech, DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2022, SixthiSeventh Semester Computer Scionce and Engineering CS 8792 — CRYPTOGRAPHY AND NETWORK SECURITY (Common to: Computer and Communication Engineering /Bletronics and ‘Communication Engineering / Electronics and telesommunication engineering! Tnformation technology) (Regulation 2017) ‘Time : Three hours ‘Maximum : 100 marks Answer ALL questions PART A—(10x2= 20 marks) 1. What are the key principles of cocurity? 2 Distinguish ative and passive attack with example 3. Ifa bit erzor ozure in plain text bloc bl, how far des the error propagate in (CBC mode of DES? 4, Find ged (66, 86) using Buches algorithm, 5. User X and ¥ exchange the key using Diffie-ellmann algorithm, Assum> 4 11 XA2 XB=8, Find the value of YA, YB and k 6, What mathomatial problem i behind security of the ElGamal eryposystom? 7. Name the four requirements defined by Kerberos. 8, Differentiate MAC and Hash function. 8. Why E-mail compatibility function in PGP required? 10. Define virus. Specify the types of viruses. a. 12 13, @ © @ © © co) » PART B— (6 « 13 = 65 marks) (Explain the network security model and its important parametors ‘with a neat bloke diagram, ® (i) Compare Substitution and Transposition tachniques with examples. 6 or Outline any four types of cryptanalysis attack and explain with neat sketches, How this attack ia made possible? a3) Explain in detail on the design principles of block cipher and the modos of operation. a3) or Disewss properties that aro satisfied by Groupe, Rings and Fields. (13) Users A and B use the Difio Hellmann key exchange technique, common prime g=11 and a primitive root alps @ Iwser Aas private key KAZI Whats Ae publickeyYA? (8) (i) fuser Bhas private key XB-6. What is B's public key YB? () (i) What i the shared secrot key? Weite the Algorithm © or Identify the posible thrests for RSA algorithm and list their counter ‘measures, Perfor decryption and eneryption using RSA elgorithm with p53, q211, e=7 and N=S, a3) ‘Many websites require users to register before they can access information or services. Suppose that you register at such a wobsito, but ‘when you return later you've forgotten your password. The wabsito then lsks you to entar your email addzess which you do. Later, you receive yout original password vin email. Discuss several security conocrns with ‘this approach to deal with forgotten passwords as) or ‘What is a digital signature? Bxplain the key generation, signing and signature verification algorithm. Bring out the steps followed to create a digital signature 3) 2 90426 1. @ » 16. @ © (With a neat sketch explain the Pee econario and IPsec Servis.) Whats a worm? Name any four known worms ® What ate the diferent types of virucos? How do they got into the systems? ® or How does PGP provides confidentiality and authentication service for ‘email and file storage applications? Draw the bloc diagram snd explain its components ro) PART C— (1 15= 15 marks) tacks are the techniques that attackers use to exploit tho vulnerabilities in applications, Attacks are often confused with ‘Vulnerabilities, $0 please try to be sure that che attack you are daseibing fomething that an attacker would do, rather than a weakness in an pplication’ 6 Consider any domain of your choice (Example Web Application 10T, Operating System eta) List down any eight attacks in the chosen domain and mention the root cause ofthe attack. o or Consider a simple LAN consisting of a number of clits, a server, a mail server and Internet access, A Grewall is designed to divide this LAN into three isolated segments namely internet segment server segment and ‘ents segment. We are writing the rules to allow only the required ‘serve tobe accessed from one segment to other Our firewall is now configured to allow only hitp requests to thy web server and no nodes at all fom outside to our internal LAN. (Does this mean that the web server is secure? () Inthe rest ofthe internal LAN secure? Justify your answer and suggest ideas how to ensure seeurity to the iiven eeenario. a 90426,

You might also like