R20 CNS
R20 CNS
UNIT-I
1. a) List and briefly define categories of Security Services and attacks. [7M]
b) Explain integer arithmetic operations in Cryptography. [7M]
(OR)
2. a) Describe the model for network security with a neat sketch. [7M]
b) Explain Extended Euclidean Algorithm. [7M]
UNIT-II
3. a) Explain in detail about Symmetric Cipher Model. [7M]
b) Discuss about DES algorithm. [7M]
(OR)
4. a) What is substitution ciphers and explain any two methods. [7M]
b) Explain about p-boxes in modern block cipher. [7M]
UNIT-III
5. a) Summarize the public key cryptographic principles. Explain RSA algorithm for [7M]
given example, where p = 3 and q = 11.
b) State and Describe Fermat’s theorem. [7M]
(OR)
6. a) Explain about MAN-in the Middle Attack (MITM). [7M]
b) Discuss ECC (Elliptical curve cryptography) in detail. [7M]
UNIT-IV
7. a) What is HMAC function? Summarize the design objectives of HMAC. [7M]
b) What is the symmetric key distribution? Explain in detail with a suitable [7M]
example.
(OR)
8. a) What is the role of message authentication in cryptography? Explain. [7M]
b) Discuss about RSA digital signature schemes. [7M]
UNIT-V
9. a) Explain in detail Transport Layer Security protocol. [7M]
b) What is SSL (Secure Socket Layer)? Explain in detail with a neat sketch. [7M]
(OR)
10. a) Enumerate the functionalities of Secure Shell protocol. [7M]
b) Discuss Tunnel Modes in IPSec with a neat sketch. [7M]
1 of 1
|'''|'|'|''||'''||||
Code No: R2032053 R20 SET -1
1 of 1
|''|''|||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--22
UNIT-I
1. a) What is a Cryptographic Attack? What are the different types of attacks? [7M]
b) Which Tools are used by attackers to attack web sites? Explain [7M]
(OR)
2. a) What are the mathematical methods used in cryptography? Give their [7M]
significance.
b) What is Fermat's theorem? Explain how it is used in security? [7M]
UNIT-II
3. a) What is Symmetric Encryption? How does it work & Why use it? [7M]
b) Explain DES algorithm with an example. [7M]
(OR)
4. a) What are the two basic ways of transforming a plain text into a cipher text? [7M]
Explain.
b) Use any method to decode the following encoded with a Caesar Cipher. [7M]
Adhziypsspn, hukaolzspaofavclz . Write the original Plain - Text
UNIT-III
5. a) What is Asymmetric- Key Cryptography? Discuss the advantages and [7M]
disadvantages of it.
b) What is Primality test? Explain how it is used in Asymmetric- Key [7M]
Cryptography.
(OR)
6. a) Discuss the 'Elliptical Wave Theory' algorithm for Asymmetric Cryptography. [7M]
What is the security?
b) If A wants to send a message securely to B, Explain What are the typical steps [7M]
involved?
UNIT-IV
7. a) What is Digital Signature? Explain the benefits of Digital signatures. [7M]
b) Describe with an example how the process involved in digital signatures. [7M]
(OR)
8. a) What is authentication? Explain how authentication is performed in Kerberos. [7M]
b) What is Hash Function? What are the applications of it in authentication? [7M]
UNIT-V
9. a) Explain how does PGP perform trust processing [7M]
b) Discuss how SSL provides secure communication [7M]
(OR)
10. a) Discuss about some application avenues of IPSec. [7M]
b) Compare and contrast IPSec and SSH. [7M]
1 of 1
|''|''|||''|'''|||'|
Code No: R2032053 R20 SET -3
|''|''|||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--42
|''|''|||''|'''|||'|
Code No: R2032053 R20 SET -1
1of 1
|''|'||||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--22
UNIT-I
1. a) Write a brief note on integrity and non-repudiation with an example. [7M]
b) Explain the network security model with neat sketch. [7M]
(OR)
2. a) Illustrate a brief note on security goals. [7M]
b) Define security attack, security mechanism and security services. [7M]
UNIT-II
3. a) Explain the techniques involved for each round in DES with neat sketch [7M]
b) Differentiate between cryptanalysis and brute force attack. [7M]
(OR)
4. a) Explain about symmetric key cryptography and public key cryptography. [7M]
b) Explain AES and various operations used in its round function. [7M]
UNIT-III
5. a) Perform encryption and decryption using RSA for p=17, q=11, e=7, M=88 [7M]
b) Write about elliptic curve cryptography. [7M]
(OR)
6. a) Explain substitute byte transformation in AES. [7M]
b) Explain the primitive operations of RC5. [7M]
UNIT-IV
7. a) Differentiate between internal and external error control. [7M]
b) Explain the role of compression function in hash function. [7M]
(OR)
8. a) Explain any one Hash algorithm. [7M]
b) Explain the requirements of digital signature scheme. [7M]
UNIT-V
9. a) Explain in detail the operation of SSL . [7M]
b) Write a short notes on E-mail security. [7M]
(OR)
10. a) Explain the services provided by PGP. [7M]
b) Differentiate between SSL version 3 and TLS. [7M]
1of 1
|''|'||||''|'''|||'|
R20 SET -3
Code No: R2032053
1of 1
|''|'||||''|'''|||'|
Code No: R2032053 SET -4
R20
III B. Tech II Semester Regular Examinations, July -2023
CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) What kinds of services are provided for data security? Discuss in detail. [7M]
b) Define plain text, cipher text, enciphering, deciphering with an example. [7M]
(OR)
2. a) Explain the aspects required for network security model. [7M]
b) Write a short note on authentication and data integrity. [7M]
UNIT-II
3. a) Explain the block structures and S-Box design used in DES algorithm. [7M]
b) Describe about RC4 and RC5 algorithm. [7M]
(OR)
4. a) Explain the strength and weakness of DES algorithm. [7M]
b) Describe various mathematics used for symmetric key encryption algorithm. [7M]
UNIT-III
5. a) User A&B exchange the key using Diffie Hellman algorithm assume A=5, [7M]
q=11, XA=2,XB=3 find YA,YB,K
b) Explain the approaches to attack the RSA algorithm. [7M]
(OR)
6. a) State the difference between AES decryption algorithm and the equivalent [7M]
inverse cipher.
b) Explain RSA algorithm in detail. Identify the possible threats for RSA [7M]
algorithm and list their counter measures.
UNIT-IV
7. a) Give a brief note on digital signature algorithm. [7M]
b) Explain in detail about hash function. [7M]
(OR)
8. a) Discuss about the objectives of HMAC and its security features. [7M]
b) Explain MD5 with neat sketch. [7M]
UNIT-V
9. a) Write a short notes on web security. [7M]
b) Explain the steps involved in SET. [7M]
(OR)
10. a) Differentiate between SSL connection and SSL session. [7M]
b) Why is the segmentation and reassembly function in PGP needed explain? [7M]
1of 1
|''|'||||''|'''|||'|