CNS Course Plan - Iv C
CNS Course Plan - Iv C
UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels,
Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security
architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography-
Foundations of modern cryptography: perfect security – information theory – product cryptosystem –
cryptanalysis.
1
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
Objective:
OBJECTIVES:
T1: William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.
Reference Book:
R1: C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India
Pvt.Ltd
R2: BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
R3: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a
PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
Website:
2
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 * * - - - - - - - - - -
CO 2 - * * - - * * * - - - -
4
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
CO 3 - * * - - * * * - - - -
CO 4 - * * - - * * * - - - -
CO 5 * * * - - * * * - - - -
Content Beyond Syllabus:
5
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
814319104020 -
814319104027,
814319104029 - 1.RSA Algorithm
2.Diffie-Hellman key exchange algorithm with
814319104031,
Batch 2 17 PPT its pros and cons
814319104033,
3.RC5 method used for encryption and
814319104034, decryption.
814319104036 -
814319104039
814319104040 -
814319104050, 1.Modes of operation in block cipher
814319104053, 2.Elliptic curve cryptography with an
Batch 3 16 Written
814319104055, example.
814319104058 - 3.Euclid‟s Algorithm
814319104060
Assignment: 3
SIM Questions:
SIM 1 Questions of Anna University with Year mentioned (12Q+12Q+ 12Q)
SIM 2 Annexure – I attached
SIM 3
6
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
Submission Details:
Prepared By Verified By
Approved By
Principal
7
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
ANNEXURE – I
SIM - 1 QUESTIONS
SIM - 2 QUESTIONS
1. Explain the key generation .encryption & decryption of SDES algorithm in detail.
2. For each of the following elements of DES, indicate the comparable element in AES if
available. (Nov/Dec 2017)
(i) XOR of subkey material with the input to the function.
(ii) F function.
(iii)Permutation p.
(iv) Swapping of halves of the block.
3. Explain about RC4 algorithm.(APR 2012)
4. Write about fermat and euler‟s theorem in detail. (MAY/JUNE 2013,NOV
2012,DEC2016,APR2017), (APR2011,NOV 2012)
5. State chinese remainder theorem & find X for given set of congruent equations X=1(mod
5) x=3(mod 9) x=2(mod 7) x=4(mod 11)
6. Explain the RSA algorithm & explain the RSA with p=7,q=11,e=17,m=8.also discuss its
merits(APR 2011,NOV 2011,NOV 2007,DEC 2016,NOV 2017,APR 2018)
7. Perform encryption and decryption using RSA algorithm for
p = 17, q = 11, e = 7 and M = 88 (A) (Nov/Dec 2018)
8. Discuss the discrete logarithm and explain diffie helman key exchange algorithm. With
its merits and demerits (APR 2011,NOV 2012,NOV 2010,DEC 2016,APR 2017)
9. Explain in details about elliptic curve cryptography(APR 2018)
8
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII
10. User alice & bob exchange the key using Diffie Helman algorithm. Assume
x=5,q=83,Xa=6,Xb=10.find Ya,Yb,K(NOV 2017)
11. User A & B use the Diffie-Hellman key exchange algorithm with a common prime q=71,and
a primitive root a=7. If user A has a private key Xa =5. What is A‟s public key Ya (June – 2014)
12. Find the secret key shared between user A and user B using Diffie Hellman algorithm for the
following: (Nov/Dec 2018) q = 353; α (primitive root) = 3, XA = 45 and XB = 50
SIM - 3 QUESTIONS
1. Explain about MD5 in detail(APR 2011,APR 2012,DEC 2016,APR 2018)
2. Illustrate about the SHA algorithm and explain (NOV 2017,NOV 2011,NOV 2010,NOV
2009,MAY 2009,MAY 2007)
3. Write a detailed note on digital signatures (NOV 2011,NOV 2010,DEC 2016,APR 2017)
4. Compare the performance of RIPEMD-160 algorithm and SHA-1 algorithm (APR 2017)
5. Describe about hash function. How its algorithm is designed ? Explain in features and
properties(NOV 2012,NOV 2008,APR 2018)
6. Explain the SHA in detail(with neat diagram) for SHA-512 processing of a single 1024
bit block. (May/June 2009)
7. Describe digital signature algorithm and show how signing and verification is done using
DSS. (May/June 2008) (April/May 2019)
8. Explain the operation description of PGP (APR 2011,NOV 2012,NOV 2010,NOV
2009,MAY 2009,DEC 2016,APR 2018)
9. Explain in detail about architecture of IP security (APR 2011,APR 2012,NOV
2010,DEC 2017)
10. Discuss authentication ,header , ESP in detail with their packet format(APR 2017, NOV
2017)
11. Discuss the working of SET & PKT with neat diagram (APR 2011,NOV 2011,APR
2012,NOV 2012, NOV 2010,DEC 2016,APR 2018)
12. Explain the step , methodology involved in SSL/TLS protocol(NOV 2017)