0% found this document useful (0 votes)
49 views7 pages

Ccs Assignment 2

This document contains an assignment for a cryptography and cyber security course. It has two parts: Part A contains 5 short answer questions worth 2 marks each that relate to course outcomes 1-5. Part B contains 4 longer answer questions worth 10 marks each relating to the application of cryptography algorithms and discussion of cyber security issues, relating to all course outcomes. The assignment is due on October 25th and has a maximum mark of 50.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views7 pages

Ccs Assignment 2

This document contains an assignment for a cryptography and cyber security course. It has two parts: Part A contains 5 short answer questions worth 2 marks each that relate to course outcomes 1-5. Part B contains 4 longer answer questions worth 10 marks each relating to the application of cryptography algorithms and discussion of cyber security issues, relating to all course outcomes. The assignment is due on October 25th and has a maximum mark of 50.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 7

PSNA COLLEGE OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


Assignment - II

CB3491 - CRYPTOGRAPHY AND CYBER SECURITY

CLASS/YEAR/Sem: BE /III / V DUE DATE: 25/10/23


Faculty:S.T.Shenbagavalli MAX. MARKS:50

CO1: Describe the fundamentals of networks security and illustrate classical encryption techniques
CO2: Analyze the different cryptographic operations of symmetric cryptographic algorithms
CO3: Analyze the different cryptographic operations of public key cryptographic algorithms
CO4: Apply various Authentication schemes to simulate different applications
CO5: Explore various cybercrimes and cyber security
CO6: Apply a suitable cryptography algorithm and cyber security tool to solve a real life problem

PART-A (ANSWER ALL) 5*2 =10


MAR
Q.NO QUESTIONS KS CO BL PI
1 Define elliptical curve cryptography. 2 3 2 1.4.1
2 Differentiate MAC and Hash function. 2 4 2 1.4.1

3 In the content of Kerberos, what is realm. 2 4 2 1.4.1

4 What is SQL injection. 2 5 1 1.4.1


5 List the primary facts of web security problem. 2 5 2 1.4.1

PART-B (ANSWER ALL) 4* 10 = 40


MAR
Q.NO QUESTIONS KS CO BL PI

6 Perform encryption and decryption using the RSA algorithm, as in Figure 9.5, for the
following: a. p = 3; q = 11, e = 7;M = 5 10 3 3 1.4.1

Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root
α=2
7 a. Show that 2 is a primitive root of 11.
b. If user A has public key Ya = 9, what is A’s private key
Xa? c. If user B has public key Yb = 3, what is
the secret key K shared with A? 10 3 3 1.4.1
8
Consider prime field q=19, it has primitive roots { 2,3,10,13,14,15}, if suppose
α=10. Then write key generation by she choose XA=16. And also sign with hash
value m=14 and alice choose secret no K=5. Verify the signature using Elgamal
digital Signature Scheme. 10 4 3 1.4.1
9
Discuss web security issues and explain the types of cyber crime. 10 5 2 1.4.1
Bloom's level wise Course outcome wise
marks distribution Remembering marks distribution
25 22
4% Understanding 20
Applying 14 14
15

Marks
20% Analysing 10
Evaluating 5
Creating 0 0 0
0
CO1 CO2 CO3 CO4 CO5 CO6
76%

Course Outcome

Faculty Incharge Course Coordinator HOD-CSE


Remembering Understanding Applying AnalysingEvaluating Creating
2 10 38 0 0 0

CO1 CO2 CO3 CO4 CO5 CO6


0 0 22 14 14 0
PO, Competencies and PI’s

mathematics, science, engineering POfundamentals, and an engineering


specialisation for the solution of complex engineering problems.
PO 2: Problem analysis: Identify, formulate, research literature, and
analyse
PO3 complex engineering
Design/Development problems reaching
of Solutions: substantiated
Design solutions for
understanding of the limitations.
complex engineering problems and
professional engineering practice.
the engineering practice.
teams, and in multidisciplinary settings
receive clear instructions
preparation and ability to engage in
independent and
Engineering life-long
learning in the broadest context of technological
change.
PSO3 To adapt to emerging Information and Communication
Technologies (ICT) to innovate ideas and solutions to existing/novel
PO, Competencies and PI’s

Competency Indicators
1.4 Demonstrate competence in specialized 1.4.1
for Applythe
solving theory and principles
problem, includingof computer
forming science
justified
engineering
2.1 knowledge
Demonstrate to the
an ability to program engineering to solve an engineering
approximations and assumptions problem
identify and formulate
3.1 Demonstrate an ability to 3.1.1 Able to define a precise problem statement with
define
5.1 a complexan / openended objectives andmodern
scope engineering tools, techniques
legalDemonstrate ability to
and public welfare 5.1.1 Identify
identify / create modern and
6.1.1resources for engineering
Identify and activities
describe various engineering roles;
8.1 particularly assituations
pertains toofprotection
unethical of the public and
roleDemonstrate an ability to
for each member 8.1.1 Identify professional
recognize ethical dilemmas conduct and propose ethical alternatives
9.1.2 Implement the norms of practice (e.g. rules,
10.1 roles,
10.1.2charters,
Produce agendas, etc.) of effective team work,
theseDemonstrate
gaps an ability to comprehend clear, well-constructed, and well-
technical supported writtentheengineering
12.1.1 Describe documents
rationale for requirement for
continuing
PSO professional
1.1 Design Computingdevelopment
Solutions using cutting
edge technologies.
PSO 3.1 Adapt ICT Technologies

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy