0% found this document useful (0 votes)
16 views2 pages

19ITB302-Cryptography and Network Security

This document is an examination paper for the B.E Degree End Semester Examination in Cryptography and Network Security at SNS College of Technology. It includes questions divided into two parts: Part A with short answer questions and Part B with detailed discussion questions. The exam covers various topics such as encryption, security mechanisms, algorithms, and protocols related to network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

19ITB302-Cryptography and Network Security

This document is an examination paper for the B.E Degree End Semester Examination in Cryptography and Network Security at SNS College of Technology. It includes questions divided into two parts: Part A with short answer questions and Part B with detailed discussion questions. The exam covers various topics such as encryption, security mechanisms, algorithms, and protocols related to network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

SNS COLLEGE OF TECHNOLOGY


(An Autonomous Institution, Affiliated to Anna University)
Coimbatore – 641 035.

B.E DEGREE END SEMESTER EXAMINATION, APRIL/MAY 2024


EIGHTH SEMESTER
B TECH - IT
19ITB302 – CRYPTOGRAPHY AND NETWORK SECURITY
(REGULATION 2019)
TIME: THREE HOURS MAXIMUM MARKS: 100
ANSWER ALL QUESTIONS

PART A –– (10 x 2 = 20 Marks)

CO BL M
1. Distinguish Encryption and Decryption. CO1 Ana 2
2. Give Need for Security at Multiple levels. CO1 Und 2
3. Write the Euclidean Algorithm. CO2 Rem 2
4. State the five modes of operation of block cipher? CO2 Und 2
5. What is the role of compression function in hash function? CO3 Rem 2
6. How is the security of a MAC function expressed? CO3 Und 2
7. Recall how digital signatures differ from authentication protocols? CO4 App 2
8. Point out the services provided by PGP? CO4 Und 2
9. Explain the protocols used to provide IP security. CO5 Und 2
10. Does the firewall ensure 100% security to the system? Comment. CO5 Ana 2

PART B –– (5 x 16 = 80 Marks)

Summarize OSI security architecture model with neat


11. (a) (i) CO1 Und 8
diagram.
(ii) Discuss the various security mechanisms. CO1 Und 8
(OR)
(b Describe DES algorithm with neat diagram and explain CO1 Und 16
) the steps.

1
Discuss the Diffie-Hellman key exchange algorithm CO2 App 10
12. (a) (i)
with its merits and demerits.
Explain public key cryptography and when it is CO2 App 6
(ii)
preferred.
(OR)
(b Describe RSA algorithm and perform encryption and CO2 App 16
) decryption using RSA algorithm for the following:
p=7 q=11, e=7, M=9.

How Hash function algorithm is designed? Explain CO3 Und 16


13. (a)
their features and properties.
(OR)
(b What is Digital Signature? Explain how it is created at CO3 Und 16
) the sender end and retrieved at receiver end
differentiate digital signature from digital certificate.

Explain in detail about X.509 authentication services CO4 App 16


14. (a)
and its adoption in realtime internet.
(OR)
(b Evaluate the performance of PGP. Compare it with CO4 App 16
) S/MIME.

Discuss the roles of the different servers in Kerberos CO5 Ana 16


15. (a) protocol. How does the user get authenticated to the
different servers?
(OR)
(b Write the steps involved in the simplified form of the CO5 Ana 16
) SSL / TLS protocol and explain the methodology
involved in computing the keys in SSL / TLS protocol.

***********
CO – Course Outcome, Blooms Taxonomy Abbreviations: Rem - Remembrance,
Und-Understanding, App - Apply, Ana - Analyze, Eva - Evaluate, Cre - Create

You might also like