0% found this document useful (0 votes)
15 views2 pages

qb-CNS (1)

The document is a question bank for the Cryptography & Network Security course at K.S. Institute of Technology for the academic year 2024-25. It outlines various modules covering topics such as symmetric and asymmetric cryptosystems, key distribution techniques, authentication methods, and email security protocols. Each module contains specific questions aimed at assessing students' understanding of the subject matter.

Uploaded by

vaibhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

qb-CNS (1)

The document is a question bank for the Cryptography & Network Security course at K.S. Institute of Technology for the academic year 2024-25. It outlines various modules covering topics such as symmetric and asymmetric cryptosystems, key distribution techniques, authentication methods, and email security protocols. Each module contains specific questions aimed at assessing students' understanding of the subject matter.

Uploaded by

vaibhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

K.S.

INSTITUTE OF TECHNOLOGY, BENGALURU - 560109


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Question Bank

Academic Year 2024-25

Batch 2021-25

Year/Semester/section IV/VIII/ A

Subject Code 21CS733


Subject Cryptography & Network Security
Name of the Instructor DR REKHA B VENKATAPUR

Module-1
1. Demonstrate the model of a symmetric cryptosystem.
2. Demonstrate DES construction in detail with a neat diagram
3. Investigate the one-time pad technique? List the advantages and disadvantages.
4. Demonstrate symmetric cipher model? Explain in detail different passive and active
attacks.
5. Discuss the following terms in detail with relevant examples: a. Interruption b.
Interception c. Modification d. Fabrication
6. Briefly investigate about Security Services and Security Mechanisms.
7. Explain the substitution techniques a) Ceaser Cipher b) Play Fair Cipher c) Hill
Cipher.

Module-2

1. Investigate Public-Key Cryptography Encryption using public key.


2. Demonstrate Public-key cryptosystems authentication with suitable sketch.

3. Investigate Public-Key Cryptography Encryption using private key.


4. Demonstrate RSA algorithm procedure steps with suitable example.
Construct Asymmetric cipher model with suitable sketch.
5. Investigate Public-Key Cryptography Encryption using public key.
6. Identify the requirements for Public key cryptography briefly.
7. Demonstrate RSA Algorithm Procedure steps with suitable example.
Module – 3

1. Identify the ways in which 2 different parties achieve key distribution.


2. Demonstrate key distribution scenario with suitable sketch.
3. Demonstrate automatic key distribution for connection oriented protocol.
4. Investigate Decentralize key distribution technique using suitable example
5. Demonstrate Control vector Encryption & Decryption with suitable sketch
6. Demonstrate the distribution of public keys using public key Authority
7. Identify the ways in which 2 different parties achieve key distribution.
8. Demonstrate key distribution scenario with suitable sketch.
9. Demonstrate automatic key distribution for connection oriented protocol.
10. Investigate Decentralize key distribution technique using suitable example.
11. Demonstrate the distribution of public keys using public key Certificate.

Module – 4

1. Demonstrate Kerberos version 4 with suitable sketch.


2. Identify the Difference between Kerberos version 4 and version 5
3. Demonstrate Mutual Authentication Using Asymmetric Encryption
4. Demonstrate One way Authentication Using Asymmetric Encryption
5. Demonstrate Kerberos version 5 with suitable sketch.
6. Illustrate Remote user Authentication principles.
7. Demonstrate Kerberos Mutual Authentication Using Asymmetric Encryption.
8. Demonstrate Remote user Authentication using Symmetric Encryption.
9. Demonstrate X.509 format structure in detail
10. Identify the difference between Mutual Authentication, One-way Authentication

Module – 5
1. How to provide Security for Email using PGP? Explain in detail with neat diagram
2. What are the content types of MIME? b) Explain the functions of S/MIME using for
Email security.
3. Describe the five principal services that Pretty Good Privacy (PGP)Provides.
4. Illustrate the important features of IKE KEY Determination algorithms
5. Demonstrate Transmission & Reception of PGP messages with suitable sketch
6. Investigate MIME content types briefly
7. Demonstrate IP sec architecture with suitable sketch
8. Demonstrate in detail PGP (Pretty Good Privacy) Cryptography functions.
9. Identify the Five header fields defined in MIME
10. Illustrate Internet Key Exchange (IKE) Key determination features.
11. Illustrate the application and benefits of IP sec

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy