0% found this document useful (0 votes)
14 views4 pages

NS

The document outlines the Internal Assessment Test for the CCS354 - Network Security course at Adhiparasakthi Engineering College for the academic year 2024-2025. It includes two sets of questions divided into three parts, covering topics such as cryptography, attacks, digital signatures, and key distribution. Each part has a specified number of questions with assigned marks, aimed at assessing students' understanding of network security concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

NS

The document outlines the Internal Assessment Test for the CCS354 - Network Security course at Adhiparasakthi Engineering College for the academic year 2024-2025. It includes two sets of questions divided into three parts, covering topics such as cryptography, attacks, digital signatures, and key distribution. Each part has a specified number of questions with assigned marks, aimed at assessing students' understanding of network security concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Om Sakthi

ADHIPARASAKTHI ENGINEERING COLLEGE


MELMARUVATHUR – 603 319
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year - ODD (2024- 2025)
REGULATION -2021
Internal Assessment Test–1
SET-01
CCS354 – NETWORK SECURITY
Year & SEM: III & VI Max. Marks: 100
Date: 07-04-2025 Time : 12:50PM-3:50 PM
Part – A (10*2 =20 Marks)
Q. No Questions BTL CO’S PO'S
1. Difference Between Active and Passive attack. 1 2 2
2. What is meant by Cryptography? 1 1 1
3. Write the Disadvantages of Public key algorithm. 1 2 2
4. Differentiate conventional encryption and public-key encryption. 1 1 1
5. Define message digest. 1 1 1
6. List the counter measures for replay attacks. 1 1 1
7. Write the main elements of X.509 certificate. 1 2 2
8. Name the four requirements defined by kerberos. 1 1 1
9. What entities constitute a full service in kerberos environment? 1 2 2
10. What are the benefits of PKI? 1 2 2
Part – B (5*13 = 65 Marks)
11(A) i)Use Fermat’s theorem to find a number between 0 and 72 2 1 1
with a congruent to 9794 modulo 73. (7)
ii)Describe the basic arithmetical functions used in SHA. (6)
(OR)
i) Discuss the types of attacks that are handled by message
11(B) authentication. (6)
3 1 1

ii) Discuss the steps involved in Digital Signature Algorithm


(DSA) with examples. (7)
12(A) What are the different types of Attacks? Explain. 3 1 1
(OR)
How Hash function algorithm is designed? Explain their
12(B) features and Properties. 4 1 1

i) Describe the schemes that are widely used for the


13(A) distribution of public keys with examples. (7) 3 1 1

ii) Elaborate the key elements of PKIX architectural model


with a neat diagram. (6)
(OR)
Explain the network security model and its important
13(B) parameters with a neat block diagram. 4 1 2
i) Write a short note on X.509 Certificates with Public Key
14(A) 3 2 2
Certificate Architecture. (5)
ii) Identify the protocol used for the following one-way
authentication technique based on asymmetric encryption.
And explain the protocol. (8)
A→B: IDA
B→A:R1
A→B: E(PRu, R₁)
(OR)
Explain the Kerberos system along with its terminology and
14(B) Kerberos Version 4. Also, discuss the weaknesses of 4 2 1
Kerberos.
i)Difference between Kerberos and SSL. (5)
15(A) ii)Difference between Symmetric key Cryptography and
3 2 2

Asymmetric key Cryptography. (8)


(OR)
i)Explain brify about Mutual Authentication and Password
15(B) based Authentication . (10) 4 1 1
ii) why is user authentication important? (3)
Part C (1*15=15 Marks)
i)Perform encryption and decryption using RSA algorithm
16(A) where p = 3 ; q = 11; e = 7 and M = 5 (10) 4 1 2
ii) Write the properties of Hash Functions. (2)
iii)What are the features of Cryptography? (3)

(OR)
16(B) The following authenticated key agreement protocol is given: 3 1 2

1 : A→B : gx mod p
2 : B→A : gy mod p, Ek ( SB(gymod p, gx mod p))
3 : A→B : Ek (SA(gx mod p, gy mod p))

Assume that the parties have agreed on a (g. p) pair for


Diffie-Hellman key exchange, that each user has RSA keys
for digital signatures and that they have agreed on a block
cipher E for use in subsequent encryption. Further, kis the
agreed secret key and SA and SB denotes A:s and B:s
signature operations respectively.

(i) Describe the details (as a list) A:s and B:s actions at
receipt of messages 2 and 3 and what beliefs they have at
that stage. (6)
(ii) Are A and B successfully authenticated to each other
after protocol run? (9)

Work hard in silence, let your success make the noise.


Om Sakthi
ADHIPARASAKTHI ENGINEERING COLLEGE
MELMARUVATHUR – 603 319
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic Year - ODD (2024- 2025)
REGULATION -2021
Internal Assessment Test–1
SET-02
CCS354 – NETWORK SECURITY
Year & SEM: III & VI Max. Marks: 100
Date: 07-04-2025 Time : 12:50PM-3:50 PM
Part – A (10*2 =20 Marks)
Q. No Questions BTL CO’S PO'S
1. List the counter measures for replay attacks. 1 1 2
2. Write the main elements of X.509 certificate. 1 2 1
3. Name the four requirements defined by kerberos. 1 1 2
4. What entities constitute a full service in kerberos environment? 1 2 1
5. What are the benefits of PKI? 1 2 1
6. Difference Between Active and Passive attack. 1 1 1
7. What is meant by Cryptography? 1 1 2
8. Write the Disadvantages of Public key algorithm. 1 1 1
9. Differentiate conventional encryption and public-key encryption. 1 2 2
10. Define message digest. 1 2 2
Part – B (5*13 = 65 Marks)
11(A) i) Discuss the types of attacks that are handled by message 2 1 1
authentication. (6)
ii) Discuss the steps involved in Digital Signature Algorithm
(DSA) with examples. (7)
(OR)
i) Use Fermat’s theorem to find a number between 0 and 72
11(B) 3 1 1
with a congruent to 9794 modulo 73. (7)
ii)Describe the basic arithmetical functions used in SHA. (6)
12(A) What are the different types of Attacks? Explain. 3 1 1
(OR)
How Hash function algorithm is designed? Explain their
12(B) features and Properties. 4 1 1

i) Describe the schemes that are widely used for the


13(A) distribution of public keys with examples. (7) 3 1 1

ii) Elaborate the key elements of PKIX architectural model


with a neat diagram. (6)
(OR)
Explain the network security model and its important
13(B) parameters with a neat block diagram. 4 1 2
i) Write a short note on X.509 Certificates with Public Key
14(A) 3 2 2
Certificate Architecture. (5)
ii) Identify the protocol used for the following one-way
authentication technique based on asymmetric encryption.
And explain the protocol. (8)
A→B: IDA
B→A:R1
A→B: E(PRu, R₁)
(OR)
Explain the Kerberos system along with its terminology and
14(B) Kerberos Version 4. Also, discuss the weaknesses of 4 2 1
Kerberos.
i)Difference between Kerberos and SSL. (5)
15(A) ii)Difference between Symmetric key Cryptography and
3 2 2

Asymmetric key Cryptography. (8)


(OR)
i)Explain brify about Mutual Authentication and Password
15(B) based Authentication . (10) 4 1 1
ii) why is user authentication important? (3)
Part C (1*15=15 Marks)
The following authenticated key agreement protocol is given:
16(A) 4 1 2
1 : A→B : gx mod p
2 : B→A : gy mod p, Ek ( SB(gymod p, gx mod p))
3 : A→B : Ek (SA(gx mod p, gy mod p))

Assume that the parties have agreed on a (g. p) pair for


Diffie-Hellman key exchange, that each user has RSA keys
for digital signatures and that they have agreed on a block
cipher E for use in subsequent encryption. Further, kis the
agreed secret key and SA and SB denotes A:s and B:s
signature operations respectively.

(i) Describe the details (as a list) A:s and B:s actions at
receipt of messages 2 and 3 and what beliefs they have at
that stage. (6)
(ii) Are A and B successfully authenticated to each other
after protocol run? (9)
(OR)
16(B) i)Perform encryption and decryption using RSA algorithm 3 1 2
where p = 3 ; q = 11; e = 7 and M = 5 (10)
ii) Write the properties of Hash Functions. (2)
iii)What are the features of Cryptography? (3)

Work hard in silence, let your success make the noise.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy