0% found this document useful (0 votes)
25 views10 pages

CNS Old Papers

Cns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views10 pages

CNS Old Papers

Cns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

17CS4703A VR17 Reg.

No:

b. How Inter Realm authentication is done in Kerberos version 4? VELAGAPUDI RAMAKRISHNA


7M SIDDHARTHA ENGINEERING COLLEGE
(AUTONOMOUS)

UNIT-IV IV/IV B.Tech. DEGREE EXAMINATION, MARCH, 2021


Seventh Semester
8. a. Illustrate how PGP can provide four different services. 8M
COMPUTER SCIENCE AND ENGINEERING
b. Explain how ESP is implemented in transport and tunnel mode? 17CS4703A CRYPTOGRAPHY AND NETWORK SECURITY
7M
Time: 3hours Max. Marks: 70
(or) Part-A is compulsory
Answer One Question from each Unit of Part-B
9. a. Discuss in detail about types of Malicious softwares. 8M
Answer to any single question or its part shall be written at one place only
b. Briefly explain about Host based firewalls. 7M
PART-A
*** 10 x 1 = 10M
1. a. How key size for triple DES can be 112 bits?
b. Differentiate between substitution and transposition technique.
c. What is the out put size of SHA 1?
d. Define selective field confidentiality.
e. List out the challenges in Diffie-Hellman algorithm.
f. What is the canonical form?
g. Differentiate between connection and session.
h. What is the role of SPI?
i. What is the need of firewall?
j. What is a logic bomb?

Page 4 of 4 Page 1 of 4
17CS4703A VR17 17CS4703A
PART-B b. We assume that Ravan can observe all messages send from Alice
4 x 15 = 60M to Bob and vice versa. Ravan has no knowledge of any keys. State
whether and how MAC protect against each attack. The auth(x) is
UNIT-I
computed with a MAC algorithm.
2. a. Explain AES algorithm and draw a neat sketch. 8M i) Ram sends a message x = “Transfer Rs 1000/- to Sita” in the
clear and also sends auth(x) to Hanuman. Ravan intercepts the
b. What are the types of security attacks? Illustrate with examples. message and replaces “Sita” with “Ravan”. Will Hanuman detect
7M this?
ii) Ram sends a message x = “Transfer Rs 1000/- to Sita” in the
(or)
clear and also sends auth(x) to Hanuman. Ravan observes the
3. a. Is it possible to perform encryption operations in parallel on multiple message and sends them 100 times to Hanuman. Will Hanuman
blocks of plain text in CBC mode? How about decryption? 5M detect this?
iii) Ravan claims that he sent some message with a valid auth(x)
b. Describe PlayFair cipher and Rail Fence cipher with examples.
to Hanuman, but Ram claims the same. Can Hanuman clear the
10M
question in either case?
UNIT-II iv) Hanuman claims that he received a message x with a valid
signature auth(x) from Ram, but Ram claims he has never sent it.
4. a. In a public-key system using RSA, you intercept the ciphertext Can Ram clear this question in either case? 10M
C = 10 sent to a user whose public key is e = 5, n = 35. What is
plain text M? 7M UNIT-III

b. How hash code can be generated using SHA 512? Brief the 6. a. Differentiate between Kerberos version 4 and version 5. 7M
procedure. 8M
b. Explain how handshake protocol is implemented in TLS. 8M
(or)
(or)
5. a. What are the principal ingredients of a public-key cryptosystem?
5M 7. a. Discuss about web traffic security approaches. 8M

Page 2 of 4 Page 3 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy