21Cs602-Cryptography and Network Security Computer Science and Engineering Semester Vi
21Cs602-Cryptography and Network Security Computer Science and Engineering Semester Vi
SEMESTER VI
PART A
1. Using the ElGamal Scheme, let α = 5, p =11, XA= 2. Predict the value of YA.
2. Interpret the meaning of padding? And, why padding is required?
3. Sketch functional diagram of RSA based Digital Signature.
4. Summarize the applications of Cryptographic hash functions.
5. Discuss the types of attacks addressed by message authentication.
6. Compute the value of ϕ( 37) and ϕ (21).
7. Compare different Threats of Web Security
8. List out the Requirements of Kerberos Authentication Protocol.
9. Illustrate, how confidentiality is obtained using encapsulating security payload?
10. Compare knowledge factor, possession factor and inherence authentication factors.
16. Sketch the design of digital signature system with Hash function.
17. Identify the authenticator used in ATM machine and connect the same with means of
authentication.
Compare IPSec and SSL.
19. Illustrate the authentication dialogue exchanged between a user and authentication server
in Kerberos.
20. List the design goals of firewalls.
21. Sketch the relative location of security facilities in the TCP/IP protocol stack.
25. Cite the seven major security concerns for mobile devices.
31. Discuss the need for message authentication? List various techniques used
for authentication
32. Explain hash function. Illustrate a variety of ways in which hash code can be used to provide
message authentication.
33. List the applications of cryptographic hash function?
PART B
1. illustrate the process of deriving eighty 64-bit words from the 1024-bits for processing
of a single block and also discuss single round function in SHA-512 algorithm
2. Explain procedure SHA 3 authentication in detail.
3. Apply ElGamal Signature scheme to generate Signature S1,S2 and verify the same at
the receiver side by calculating V1 and V2 with following specification: q =19 and
assume XA= 10 and m=22.
4. Apply Kerberos authentication mechanism for accessing a file from a remote server
and explain with a suitable diagram.
5. Draw IPSec Authentication Header and write short notes on each element of the
Header.
6. Illustrate Transport Layer Security (TSL) Architecture and discover how Change
Cipher Spec Protocol and Alert Protocol are used for imprudent of security.
7. Infer the Kerberos Version 5 message exchanges.
9. Apply the concept of DSA with key generation and verification for a bank statement
mail.
10. Illustrate different means of authentication.
12. Explain in details about the techniques involved in wireless and Mobile device
security
13. Briefly explain MAC requirements and security, MACs based on Hash Functions and
MACs based on Block Ciphers with neat diagram.
14. Explain in details about four SSL Protocols with proper diagram.
15. Explain the technical details of firewall and describe any three types of firewalls with
neat diagram.
16. Illustrate in detail about the message authentication code and its requirements.
Develop the HMAC Design Objectives and build its structure
17. Explain Elgamal Cryptographic system with suitable example.
19. Discover how the Kerberos versions are used for distribution of keys in real-time
applications.
20. With a neat sketch, explain the Elliptic curve cryptography with an example.
21. Illustrate the Secure Socket Layer (SSL) Architecture with suitable diagram.
22. Discuss examples from real life, where the following security objectives are:
Confidentiality
Integrity
Non-Repudiation
25. Alice and Bob use the Diffie – Hellman key exchange technique with a common prime
number 11 and a primitive root of 2. If Alice and Bob choose distinct secret integers
as 9 and 3, respectively, then compute the shared secret key.
26. With the help of a neat diagram, explain wired and wireless TLS architecture.
Suggest the security scheme to be adopted in client and server side to accommodate
the above requirements and justify your recommendations.
28. Explain in details about 3 remote user authentication principles with neat diagram.
With a neat Sketch explain the Elliptic curve cryptography with an example.
30. Establish the need for a firewall and explain in detail the different types of firewalls.
33. Describe the process of deriving eighty 64-bit words from the 1024-bits for processing
of a single block and also discuss single round function in SHA-512 algorithm
34. Trace the structure of HMAC and illustrate the overall operation.
36. Apply EIGamal Signature scheme to generate Signature S1, S2 and verify the same
at the receiver side by calculating V1 and V2 with following specification: q = 19, a
=10, XA= 16,K = 5, M = 14.
37. Identify the need for a firewall and explain in detail the different types of firewalls.
39. Illustrate the features of transport layer security such as TLS Architecture, TLS record
protocol, and TLS handshake protocol.
40. Examine the various intrusion detection techniques.
41. Illustrate the security threats of mobile devices and outline the principal elements in a
mobile device security strategy.
42. Explain the various security threats and its countermeasures for wireless networks.
45. Illustrate the features of transport layer security such as TLS Architecture, TLS record
protocol, and TLS handshake protocol.
46. Examine the various intrusion detection techniques.
47. Illustrate the security threats of mobile devices and outline the principal elements in a
mobile device security strategy.
48. Explain the various security threats and its countermeasures for wireless networks.
49. Examine in detail ElGamal Digital Signature scheme with an example.
51. Consider prime field q=19, it has primitive roots {2, 3, 10, 13, 14, 15}, if suppose
α=10. Then write key generation by she choose XA=16. And also sign with hash
value
m=14 and Alice choose secret no K=5. Verify the signature using Elgamal digital
Signature Scheme
52. Discover any one method of efficient implementation of HMAC
53. Explain the various security threats and its countermeasures for wireless networks.