0% found this document useful (0 votes)
9 views10 pages

CNS Prev

The document outlines various topics related to network security, cryptography, and steganography across multiple years. It includes questions on security models, encryption algorithms, authentication services, and security protocols. The content is structured by units and years, detailing specific exam questions and concepts to be studied.

Uploaded by

Afreen Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views10 pages

CNS Prev

The document outlines various topics related to network security, cryptography, and steganography across multiple years. It includes questions on security models, encryption algorithms, authentication services, and security protocols. The content is structured by units and years, detailing specific exam questions and concepts to be studied.

Uploaded by

Afreen Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

UNIT 1

2023

1. a)What is steganography? What are the similarities and


differences between steganography and cryptography ? What are
the relative advantages and disadvantages of steganography?

b)Give the classification of security attacks. [5+5m]

2. a)Bank is performing all its financial transactions over the


internet . What kind of security is required? Illustrate with an
example bank .
b) Draw and Explain the model for the network security. [5+5m]

2022

1. Explain the model of network security. [7m]

2. Compare cryptgraphy and steganography . [8m]

3. What are the security services? [7m]

4. Explain various substitution techniques. [8m]

2022 (Feb\march)

1. Differenciate between Active attacks and Passive attcks .


2. Eloborate any 4 substitution techniques and lit their merits and
demerits.[7+8m]
3. Discuss breifly about categories of service security and attacks .
4. Explain the model for network security with neat sketch .
[8+7m]
2020

1. Differentiate between Symmetric and Asymmetric


cryptographic techniques[8m]
2. Write about integrity and Non-repudiation Security Services[7m]

2019
1. Model for network security with neat sketch.[4m]
2. Describe pervasive and specific security mechanisms in detail .
[6m]
3. Write any 3 transposition ciphers with examples.[6m]
4. Brute force attacks in detail [4m] (check syllabus )
UNIT 2

2023

1. Explain RSA encryption. Also, critically analyze the security


aspects of RSA. [10m]

2. With a neat diagram , explain one round of DES algorithm.


b) List and explain the principles of public key cryptosystem
[5+5m]

2022

1. Explain the Blowfish algorithm [15m]

2. Explain the Deffie Helmann key exchange algorithm . [8m]

3. What are the differences between public key and private


key ?[7m]

2022(Feb\March)

1. Using RSA algorithm solve n,d if p=11,q=3 ,e=3 .Encrypt


“Hello World ”message .[6m]

2. Give a detailed explanation of key generation and encryption of


IDEA algorithm[9m]

3. Users Aand B use Deffie-Hellman key exchange technique , a


common prime q=1 and a primitive root aplha =7 . Test the
following.
a) What is the shared secret key ? Also write the algorithm .
b) How man -in-the-middle attack can be performed in Deffie
Hellman algorithm .[8+7m]
2020

1. Enumerate in detail the steps in Data Encryption Standar


algorithm and explain the process involved in each round with
neat diagram .[15m]
2. Explain all the parameters in feistel block cipher structure [6m]
3. Describe the encryption process IDEA algorithm with neat
sketch.[9m]

2019

1. Summerize the public key cryptographic principles , Explain


RSA algorithm for give exaple , where p=3 and q=11[5m]
2. Enumeraye Deffie-hellman key exchange for encryption and
decrytption with examples .[5m]
3. Enumerate in detail about steps in BlowFish Algorithm and
explain the process of each round with neat diagram[10m]
UNIT 3

2023

1. Discuss the Symmetric Key Distribution using Symmetric and


Asymmetric Encryption .[10m]
2. Explain the HMAC, CMAC and Digital signatures.[10m]

2022

1. 1.Explain the SHA -512 algorithm .[8m]


2. Discuss about the distribution of public keys [7m]
3. Explain the X.509 authentication service.[8m]
4. What are the aunthentication requiremets?[7m]

2022(Feb\march)

1. How the authentication procedures are defined by X.509


certificate . Evaluate the concept of ‘Certificate Chain’ for
verification of Digital Signatures on X.509 certificate.[6m]
2. Categorize the various servers used in Kerberos, Explain the
role of each one .[9m]
3. Discuss breifly about the compression function of Secure Hash
algorithm .[8m]
4. Explain the structure of CMAC. Classify the difference between
CMAC and HMAC [7m]
2020

1. What is the purpose of SHA-1 Algorithm ? What is the legth of


message digest and key size in SHA-1 Algorithm? Discuss about
all rounds in SHA-1 algorithm.[15m]
2. Wat is Digital signature ? Describe the procedure how to get
Digital Certificates.[7m]
3. Write about X.509 Directory Authentication service.[8m]

2019

1. What is HMAC function ? summerize the design objectives of


HMAC.[5m]
2. Explain about Elgamal Digital Signature Scheme.[5m]
3. Discuss about the message exchange mechanism in kerberos
version 4.[10m]
UNIT 4

2023

1. Describe the transport layer security. [10m]

2. List the steps involved in the SSL record protocol


transmission.[10m]

2022

1. Explain SSL protocol stack .[8m]


2. What is mobile device security?[7m]

2022 (feb\march )

1. What protocols comprise SSL? Distinguish between SSL


connection and SSL session.[5m]
2. Make up the security contraints of IEEE 802.11i Wireless LAN
in detail.[5m]
3. Compare and contrast the security threats related to mobile
devices.[5m]

2020

1. Write about the functionalities of Transport Layer Security


Protocol.[7m]
2. Describe the security constraints of HTTP protocol.[8m]
2019

1. Explain the security contraints of IEEE 802.11i Wireless LAN


in detail.[10m]
2. What is SSL? Explain SSL record format.[6m]
3. Enumerate the functionalities of Secure shell.[4m]
UNIT 5

2023

1. Discuss the significance of key identifiers in the PGP message


and descirbe the five header fields in MIME .
b) Explain the encapsulating security payload. [5+5m]

2. Discuss the implementation of security features considering


Secure Inter-branch payment transactions case study.[10m]

2022

1. Explain various methods of combining security


associations.[8m]

2. What is cross site scripting vulnerability?[7m]

2022 (Feb\march)

1. Draw the IP security authentication header and identify the of


each field .[3m]

2. What are the pricipal services provided by the S\MIME?[5m]

3. How does the Pretty Good Privacy provide confidentiality and


authentication service for e-mail and file storage application?
Draw the block diagram and elaborate its component[7m]
2020

1. Write a short note on:


a) S\MIME
b) Authentication Header Protocol [8+7m]

2019
1. General format of PGP meeasage with a pictorial representation and
explain how PGP used for email security?[10m]
2. Describe functionalities of Internet Key Exchange protocol [5m]
3. How to provide security during Inter -branch Pyament
transactions? [5m]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy