0% found this document useful (0 votes)
3 views

Cryptography and Network Security

The document outlines the examination structure for a Cryptography and Network Security course, detailing the units and questions to be answered by students. Each unit contains two questions, with a focus on topics such as network attacks, block ciphers, key exchange algorithms, MIME specifications, and SSL protocols. The exam is scheduled for December 2024, with a total of 70 marks available.

Uploaded by

ysjenissy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Cryptography and Network Security

The document outlines the examination structure for a Cryptography and Network Security course, detailing the units and questions to be answered by students. Each unit contains two questions, with a focus on topics such as network attacks, block ciphers, key exchange algorithms, MIME specifications, and SSL protocols. The exam is scheduled for December 2024, with a total of 70 marks available.

Uploaded by

ysjenissy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

H.T.No.

Code No: CT3547 SRGEC-R20


IV B.Tech I Semester Regular/Supplementary Examinations, December 2024
CRYPTOGRAPHY AND NETWORK SECURITY
(Computer Science and Engineering & Artificial Intelligence and Machine Learning)
Time: 3 Hours Max. Marks: 70
Note: Answer one question from each unit.
All questions carry equal marks.
5 × 14 = 70M
UNIT-I
1. a) If Alice and Bob communicating each other over a network, then Darth entered into the
network and cause a threat to Bob and Alice communication. What type of attacks can be
introduced into network that can compromise the security and privacy of their
communication and describe them with suitable illustration. (7M)
b) Explain the Model for Network Security with neat diagram. (7M)
(OR)
2. a) Briefly explain the various security services that can be afford in the network according to
X.800 standard. (7M)
b) What is meant by Distributed Denial of service attack? Discuss how the attacker can
exhaust the victim‘s capacities. (7M)
UNIT-II
3. a) Draw the functionality diagram (functionality in one round) of DES with number of bits in
each flow of data. (7M)
b) List out the five block cipher modes of operations and describe the Electronic Code Book
(ECB) with its advantages and disadvantages. (7M)
(OR)
4. a) Write a note on Block Cipher Design Principles. (7M)
b) Describe how encryption and decryption can be performed using Triple DES algorithm
with two different 56 bit keys. (7M)
UNIT-III
5. Explain the process of deriving eighty 64-bitwords from 1024 bits for processing of a single
blocks and also discuss single round function in SHA-512 algorithm. Show that how the
values of W16, W17, W18 and W19 can be generated. (14M)
(OR)
6. a) How to establish a shared secret key between two parties using Diffie- Hellman key
exchange algorithm? Explain. (7M)
b) Generate the key attributes for the values p = 11 and q = 3. Also encrypt the message
m = 2 with the generated keys using RSA. (7M)

Page 1 of 2
UNIT-IV
7. a) List and describe the major types of content and sub types specified in RFC 2046. (7M)
b) Describe header fields defined in MIME and the elements of MIME specifications. (7M)
(OR)
8. Describe the overall operation of HMAC with algorithm with neat diagram. (14M)
UNIT-V
9. a) What protocols comprise SSL? With neat diagram explain about the functioning of SSL
Handshake protocol. (7M)
b) What is meant by transport mode and tunnel mode? How the encapsulated IP packet can
be protected and communicated using these modes? (7M)
(OR)
10. a) What are the various types of Firewalls? Illustrate the types of firewalls with neat
diagrams. (7M)
b) Draw the IP security authentication header and describe the functions of each field. (7M)

*****

Page 2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy