Ccs Assignment 2
Ccs Assignment 2
CO1: Describe the fundamentals of networks security and illustrate classical encryption techniques
CO2: Analyze the different cryptographic operations of symmetric cryptographic algorithms
CO3: Analyze the different cryptographic operations of public key cryptographic algorithms
CO4: Apply various Authentication schemes to simulate different applications
CO5: Explore various cybercrimes and cyber security
CO6: Apply a suitable cryptography algorithm and cyber security tool to solve a real life problem
6 Perform encryption and decryption using the RSA algorithm, as in Figure 9.5, for the
following: a. p = 3; q = 11, e = 7;M = 5 10 3 3 1.4.1
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root
α=2
7 a. Show that 2 is a primitive root of 11.
b. If user A has public key Ya = 9, what is A’s private key
Xa? c. If user B has public key Yb = 3, what is
the secret key K shared with A? 10 3 3 1.4.1
8
Consider prime field q=19, it has primitive roots { 2,3,10,13,14,15}, if suppose
α=10. Then write key generation by she choose XA=16. And also sign with hash
value m=14 and alice choose secret no K=5. Verify the signature using Elgamal
digital Signature Scheme. 10 4 3 1.4.1
9
Discuss web security issues and explain the types of cyber crime. 10 5 2 1.4.1
Bloom's level wise Course outcome wise
marks distribution Remembering marks distribution
25 22
4% Understanding 20
Applying 14 14
15
Marks
20% Analysing 10
Evaluating 5
Creating 0 0 0
0
CO1 CO2 CO3 CO4 CO5 CO6
76%
Course Outcome
Competency Indicators
1.4 Demonstrate competence in specialized 1.4.1
for Applythe
solving theory and principles
problem, includingof computer
forming science
justified
engineering
2.1 knowledge
Demonstrate to the
an ability to program engineering to solve an engineering
approximations and assumptions problem
identify and formulate
3.1 Demonstrate an ability to 3.1.1 Able to define a precise problem statement with
define
5.1 a complexan / openended objectives andmodern
scope engineering tools, techniques
legalDemonstrate ability to
and public welfare 5.1.1 Identify
identify / create modern and
6.1.1resources for engineering
Identify and activities
describe various engineering roles;
8.1 particularly assituations
pertains toofprotection
unethical of the public and
roleDemonstrate an ability to
for each member 8.1.1 Identify professional
recognize ethical dilemmas conduct and propose ethical alternatives
9.1.2 Implement the norms of practice (e.g. rules,
10.1 roles,
10.1.2charters,
Produce agendas, etc.) of effective team work,
theseDemonstrate
gaps an ability to comprehend clear, well-constructed, and well-
technical supported writtentheengineering
12.1.1 Describe documents
rationale for requirement for
continuing
PSO professional
1.1 Design Computingdevelopment
Solutions using cutting
edge technologies.
PSO 3.1 Adapt ICT Technologies