0% found this document useful (0 votes)
281 views9 pages

R20 CNS

The document outlines the examination structure for a course on Cryptography and Network Security, detailing various units and questions to be answered. Each unit covers different topics such as security services, symmetric and asymmetric encryption, digital signatures, and network protocols. Students are required to answer five questions, selecting one from each unit, with all questions carrying equal marks.

Uploaded by

sushmavemula991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views9 pages

R20 CNS

The document outlines the examination structure for a course on Cryptography and Network Security, detailing various units and questions to be answered. Each unit covers different topics such as security services, symmetric and asymmetric encryption, digital signatures, and network protocols. Students are required to answer five questions, selecting one from each unit, with all questions carrying equal marks.

Uploaded by

sushmavemula991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Code No: R2032053 R20 SET -1

III B. Tech II Semester Supplementary Examinations, December -2023


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****

UNIT-I
1. a) List and briefly define categories of Security Services and attacks. [7M]
b) Explain integer arithmetic operations in Cryptography. [7M]
(OR)
2. a) Describe the model for network security with a neat sketch. [7M]
b) Explain Extended Euclidean Algorithm. [7M]
UNIT-II
3. a) Explain in detail about Symmetric Cipher Model. [7M]
b) Discuss about DES algorithm. [7M]
(OR)
4. a) What is substitution ciphers and explain any two methods. [7M]
b) Explain about p-boxes in modern block cipher. [7M]
UNIT-III
5. a) Summarize the public key cryptographic principles. Explain RSA algorithm for [7M]
given example, where p = 3 and q = 11.
b) State and Describe Fermat’s theorem. [7M]
(OR)
6. a) Explain about MAN-in the Middle Attack (MITM). [7M]
b) Discuss ECC (Elliptical curve cryptography) in detail. [7M]
UNIT-IV
7. a) What is HMAC function? Summarize the design objectives of HMAC. [7M]
b) What is the symmetric key distribution? Explain in detail with a suitable [7M]
example.
(OR)
8. a) What is the role of message authentication in cryptography? Explain. [7M]
b) Discuss about RSA digital signature schemes. [7M]
UNIT-V
9. a) Explain in detail Transport Layer Security protocol. [7M]
b) What is SSL (Secure Socket Layer)? Explain in detail with a neat sketch. [7M]
(OR)
10. a) Enumerate the functionalities of Secure Shell protocol. [7M]
b) Discuss Tunnel Modes in IPSec with a neat sketch. [7M]

1 of 1

|'''|'|'|''||'''||||
Code No: R2032053 R20 SET -1

III B. Tech II Semester Regular/Supplementary Examinations, May/June-2024


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) What is the need of security? Explain about various security threats. [7M]
b) Explain Simple substitution ciphers with an example. [7M]
(OR)
2. a) What is Cryptography? What are the main challenges and risks? [7M]
b) The coded message MXOQCY IFUDT YDWIE CKSXJ YCUED JXYI was [7M]
received. It is known that the code was a shift code with equation c = p − 10.
Decode the message. Be sure to put in appropriate spaces.
UNIT-II
3. a) What is symmetric encryption scheme? What are the Five elements of it? [7M]
Explain.
b) What are the mathematical concepts used in symmetric cryptographic [7M]
algorithms? Explain how is algebra used in cryptography?
(OR)
4. a) What is Cipher text? Explain with an example about Caesar cipher [7M]
b) What is an Algorithm? Discuss about any one Symmetric encryption [7M]
algorithm.
UNIT-III
5. a) What is Asymmetric encryption? What problems does it solve? [7M]
b) Explain MILLER-RABIN algorithm for testing a large number for primality [7M]
(OR)
6. a) Discuss RSA algorithm for Asymmetric Cryptography. [7M]
b) Given two prime numbers P = 17 and Q = 29, find out N E and D in a RSA [7M]
encryption process.
UNIT-IV
7. a) Describe the properties of digital signatures. [7M]
b) Write and explain the Digital Signature Algorithm (DSA). [7M]
(OR)
8. a) What is authentication? Explain the different types of authentication. [7M]
b) What are the characteristics of acceptable hash functions in Cryptography? [7M]
Justify?
UNIT-V
9. a) What is PGP? Draw and explain the general PGP packet structure. [7M]
b) What is SSL? Write short notes on the keys used in SSL. [7M]
(OR)
10. a) Give the architecture of e-mail system with a neat sketch. [7M]
b) Compare and contrast IPSec and SSL. [7M]

1 of 1

|''|''|||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--22

III B. Tech II Semester Regular/Supplementary Examinations, May/June-2024


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****

UNIT-I
1. a) What is a Cryptographic Attack? What are the different types of attacks? [7M]
b) Which Tools are used by attackers to attack web sites? Explain [7M]
(OR)
2. a) What are the mathematical methods used in cryptography? Give their [7M]
significance.
b) What is Fermat's theorem? Explain how it is used in security? [7M]
UNIT-II
3. a) What is Symmetric Encryption? How does it work & Why use it? [7M]
b) Explain DES algorithm with an example. [7M]
(OR)
4. a) What are the two basic ways of transforming a plain text into a cipher text? [7M]
Explain.
b) Use any method to decode the following encoded with a Caesar Cipher. [7M]
Adhziypsspn, hukaolzspaofavclz . Write the original Plain - Text
UNIT-III
5. a) What is Asymmetric- Key Cryptography? Discuss the advantages and [7M]
disadvantages of it.
b) What is Primality test? Explain how it is used in Asymmetric- Key [7M]
Cryptography.
(OR)
6. a) Discuss the 'Elliptical Wave Theory' algorithm for Asymmetric Cryptography. [7M]
What is the security?
b) If A wants to send a message securely to B, Explain What are the typical steps [7M]
involved?
UNIT-IV
7. a) What is Digital Signature? Explain the benefits of Digital signatures. [7M]
b) Describe with an example how the process involved in digital signatures. [7M]
(OR)
8. a) What is authentication? Explain how authentication is performed in Kerberos. [7M]
b) What is Hash Function? What are the applications of it in authentication? [7M]
UNIT-V
9. a) Explain how does PGP perform trust processing [7M]
b) Discuss how SSL provides secure communication [7M]
(OR)
10. a) Discuss about some application avenues of IPSec. [7M]
b) Compare and contrast IPSec and SSH. [7M]
1 of 1

|''|''|||''|'''|||'|
Code No: R2032053 R20 SET -3

III B. Tech II Semester Regular/Supplementary Examinations, May/June - 2024


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) What is Network Security? What are the Four Goals of Network Security? [7M]
Explain with examples.
b) What tricks attackers use to hack online banking accounts? How to prevent them? [7M]
(OR)
2. a) Elaborate on attacks threatening confidentiality. [7M]
b) What are the two basic ways of transforming a plain text into a cipher text? [7M]
UNIT-II
3. a) What is symmetric and asymmetric encryption? Explain the various components [7M]
of the encryption.
b) Elaborate on components of a modern block cipher. [7M]
(OR)
4. a) What is Caesar cipher? Explain how Caesar cipher can be cracked? [7M]
b) A plaintext was encrypted with a Caesar cipher with a shift of 7. The resulting [7M]
cipher text is: Kvu'aqbknlhivvrifpazjvcly
What was the original plain-text?
UNIT-III
5. a) How does Fermat theorem is used in finding multiplicative inverses? Explain. [7M]
b) What are the different types of primality testing algorithms? Explain [7M]
(OR)
6. a) Discuss The 'Diffie-Hellman algorithm' for Asymmetric Cryptography. [7M]
b) In RSA, given N = 187 and the encryption key(E) as 17 find out the corresponding [7M]
private key D.
UNIT-IV
7. a) A cryptographic hash function must satisfy three criteria. What are they? Explain [10M
them. ]
b) What happens if a k value used in creating a DSA signature is compromised? [4M]
(OR)
8. a) What is authentication? Explain how authentication is performed in multiple [7M]
Kerberos.
b) What is hash Function? Explain HMAC algorithm. What is to be done to speed up [7M]
HMAC algorithm?
UNIT-V
9. a) Write short note on PGP Key Rings. [7M]
b) Explain the various SSL Protocols and their structure and use. [7M]
(OR)
10. a) What is IPSec? Explain why it is necessary in security of IP network. [7M]
b) Compare and contrast IPSec and TLS. [7M]
1 of 1

|''|''|||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--42

III B. Tech II Semester Regular/Supplementary Examinations, May/June-2024


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) Elaborate on the security goals to be achieved. [7M]
b) Explain the operational security model with a block diagram. [7M]
(OR)
2. a) What is timing Attack? What are the possible defenses against timing attack? [7M]
b) What are the elements of information security? Explain each in brief. [7M]
UNIT-II
3. a) Write short notes on following: Commutative ring, operations on polynomials [7M]
b) Give the basic structure of Feistel cipher. [7M]
(OR)
4. a) Compare Linear cryptanalysis with differential cryptanalysis. [7M]
b) A plaintext was encrypted with a Caesar cipher, resulting in the [7M]
following: DOOV ZHOO WKDW HQGV ZHOO
Can you work out what the plaintext was?
UNIT-III
5. a) How fundamental theorem of factorization is used in finding GCD and LCM? [7M]
Explain.
b) What is key Wrapping? Explain how it is useful? [7M]
(OR)
6. a) Discuss RSA algorithm for Asymmetric- Key Cryptography [7M]
b) Consider a plain - text alphabet G. Using RSA algorithm and the values as E = 3 [7M]
and d = 11 and N = 15 then Find out what this plain - text alphabet encrypts to.
Verify that upon decryption it transforms back to G
UNIT-IV
7. a) What is Random Oracle Model? Focus on the attacks on Random Oracle Model. [7M]
b) Describe with an example the process involved in Digital Signature Algorithm [7M]
DSA
(OR)
8. a) Compare SSL authentication process with Kerberos [7M]
b) Explain Block Cipher based MAC scheme [7M]
UNIT-V
9. a) Discuss the various services offered by PGP to secure e-mails [7M]
b) IPSec operates on two different modes. Explain them. [7M]
(OR)
10. a) PGP uses certificates to authenticate public key. Explain them. [7M]
b) Compare and contrast IPSec and SSL [7M]
1 of 1

|''|''|||''|'''|||'|
Code No: R2032053 R20 SET -1

III B. Tech II Semester Regular Examinations, July -2023


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) Explain the categories of security threats. [7M]
b) Explain active and passive attacks in detail. [7M]
(OR)
2. a) Differentiate policies, mechanisms and services in network security. [7M]
b) Differentiate between symmetric and asymmetric encryption. [7M]
UNIT-II
3. a) Explain about the essential ingredients of symmetric cipher. [7M]
b) Compare and contrast between stream cipher with block cipher. [7M]
(OR)
4. a) List and explain block cipher modes of operation. [7M]
b) Explain DES and different modes of operation in DES state its advantages and [7M]
disadvantages.
UNIT-III
5. a) Explain various mathematics used for asymmetric key crypotography. [7M]
b) Explain round functions of Advanced Encryption Standard Algorithm [7M]
(OR)
6. a) State the differences between diffusion and confusion . [7M]
b) Brief the strength of RSA algorithm and analyze its performance. [7M]
UNIT-IV
7. a) Explain HASH function and its properties in cryptography. [7M]
b) Explain the classes of message authentication function. [7M]
(OR)
8. a) Briefly explain the requirements of message authentication. [7M]
b) Differentiate between MAC and Hash function.. [7M]
UNIT-V
9. a) Explain the operational description of PGP. [7M]
b) Write a short note on S/MIME. [7M]
(OR)
10. a) Explain the architecture of IP security. [7M]
b) Write a short notes on Authentication header and ESP. [7M]

1of 1

|''|'||||''|'''|||'|
Code No: R2032053
R2031011
R2031351
R203135A
R203147A
R203147C
R203105O
P2031051 R20 SET
SET
RA--22

III B. Tech II Semester Regular Examinations, July -2023


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****

UNIT-I
1. a) Write a brief note on integrity and non-repudiation with an example. [7M]
b) Explain the network security model with neat sketch. [7M]
(OR)
2. a) Illustrate a brief note on security goals. [7M]
b) Define security attack, security mechanism and security services. [7M]
UNIT-II
3. a) Explain the techniques involved for each round in DES with neat sketch [7M]
b) Differentiate between cryptanalysis and brute force attack. [7M]
(OR)
4. a) Explain about symmetric key cryptography and public key cryptography. [7M]
b) Explain AES and various operations used in its round function. [7M]
UNIT-III
5. a) Perform encryption and decryption using RSA for p=17, q=11, e=7, M=88 [7M]
b) Write about elliptic curve cryptography. [7M]
(OR)
6. a) Explain substitute byte transformation in AES. [7M]
b) Explain the primitive operations of RC5. [7M]
UNIT-IV
7. a) Differentiate between internal and external error control. [7M]
b) Explain the role of compression function in hash function. [7M]
(OR)
8. a) Explain any one Hash algorithm. [7M]
b) Explain the requirements of digital signature scheme. [7M]
UNIT-V
9. a) Explain in detail the operation of SSL . [7M]
b) Write a short notes on E-mail security. [7M]
(OR)
10. a) Explain the services provided by PGP. [7M]
b) Differentiate between SSL version 3 and TLS. [7M]

1of 1

|''|'||||''|'''|||'|
R20 SET -3
Code No: R2032053

III B. Tech II Semester Regular Examinations, July -2023


CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT-I
1. a) Explain different types of security services [7M]
b) What are the basic mathematical concepts used in cryptography? Explain with [7M]
examples.
(OR)
2. a) Explain various types of cryptanalytic attacks and cryptanalysis and [7M]
cryptology.
b) What is steganography? explain the techniques in it, it from cryptography. [7M]
UNIT-II
3. a) Briefly explain AES with neat sketch. [7M]
b) Explain the transformation functions and key expansion for each round in AES. [7M]
(OR)
4. a) Write about different symmetric key ciphers. [7M]
b) Draw the general structure of DES and explain encryption and decryption [7M]
process.
UNIT-III
5. a) Explain the primitive operations of RC5. [7M]
b) Differentiate between private key and public key encryption. [7M]
(OR)
6. a) Perform decryption and encryption using RSA algorithm with [7M]
p=3,q=11,e=7,N=5
b) Justify your answer whether Diffie Hellman key exchange protocol is [7M]
vulnerable.
UNIT-IV
7. a) Differentiate between message authentication and one-way hash function. [7M]
b) Write the difference between MD5 and SHA. [7M]
(OR)
8. a) Explain secure hash algorithm in detail. [7M]
b) Explain different types of attacks that are addressed by message authentication. [7M]
UNIT-V
9. a) Give a brief note on IP security. [7M]
b) Explain internet key management in IPSEC. [7M]
(OR)
10. a) Explain SET with neat sketch. [7M]
b) Explain the features of SET. [7M]

1of 1

|''|'||||''|'''|||'|
Code No: R2032053 SET -4
R20
III B. Tech II Semester Regular Examinations, July -2023
CRYPTOGRAPHY AND NETWORK SECURITY
(Com. To CSE & IT)
Time: 3 hours Max. Marks: 70
Answer any FIVE Questions ONE Question from Each unit
All Questions Carry Equal Marks
*****

UNIT-I
1. a) What kinds of services are provided for data security? Discuss in detail. [7M]
b) Define plain text, cipher text, enciphering, deciphering with an example. [7M]
(OR)
2. a) Explain the aspects required for network security model. [7M]
b) Write a short note on authentication and data integrity. [7M]
UNIT-II
3. a) Explain the block structures and S-Box design used in DES algorithm. [7M]
b) Describe about RC4 and RC5 algorithm. [7M]
(OR)
4. a) Explain the strength and weakness of DES algorithm. [7M]
b) Describe various mathematics used for symmetric key encryption algorithm. [7M]
UNIT-III
5. a) User A&B exchange the key using Diffie Hellman algorithm assume A=5, [7M]
q=11, XA=2,XB=3 find YA,YB,K
b) Explain the approaches to attack the RSA algorithm. [7M]
(OR)
6. a) State the difference between AES decryption algorithm and the equivalent [7M]
inverse cipher.
b) Explain RSA algorithm in detail. Identify the possible threats for RSA [7M]
algorithm and list their counter measures.
UNIT-IV
7. a) Give a brief note on digital signature algorithm. [7M]
b) Explain in detail about hash function. [7M]
(OR)
8. a) Discuss about the objectives of HMAC and its security features. [7M]
b) Explain MD5 with neat sketch. [7M]
UNIT-V
9. a) Write a short notes on web security. [7M]
b) Explain the steps involved in SET. [7M]
(OR)
10. a) Differentiate between SSL connection and SSL session. [7M]
b) Why is the segmentation and reassembly function in PGP needed explain? [7M]

1of 1

|''|'||||''|'''|||'|

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy