ST.ANNS COLLEGE OF ENGINEERING & TECHNOLOGY:: CHIRALA
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SUBJECT:
CRYPTOGRAPHY & NETWORK SECURITY
BRANCH: IV CSE
FACULTY:
K.SUBBARAO
YEAR: 2013

14
ASSIGNMENTS
UNIT

1
1.
What is Security attack? Explain about various security attacks?
2.
What is security Service? Explain about the security services?
3.
What is Security Mechanism? Explain about the security Mechanisms?
4.
What are the Protocol
Vulnerabilities, explain in detail?
5.
Write Short notes on the following software Vulnerabilities?
Session Hijacking
Buffer Overflow
Format String Attack
AQL Injection
6.
Explain with neat diagram, the model of Network Security?
7.
Briefly explain the basics of t
he Cryptography, with Symmetric Cipher Model?
8.
Explain different types of attacks involved in Cryptanalysis and Brute

Force attack?
9.
Explain in detail about the following Substitution Ciphers?
a.
Julius Caesar Cipher
b. Monoalphabetic Cipher
c. Playfair Ciph
er
d. Hill Cipher
e. Polyalphabetic Cipher
f. One Time Pad
10.
Explain about Transposition Ciphers, with example?
11.
Explain with example the concepts of Confusion and Diffusion?
UNIT

2
1.
Explain about the secret key Cryptography along with its principles?
2.
Explain about the Data Encryption Standard (DES) with diagram? and its Strengths?
3.
Explain about the Feistel Cipher Structure?
4.
Explain about the block cipher model principles and operations?
5.
Explain Triple DES with example?
6.
Write short notes on the followin
g Symmetric Ciphers
a.
IDEA
b. Blowfish
c. RC5
d. CAST 128
7.
Explain the AES algorithm?
UNIT

3
1.
Explain about the Groups, Rings , and Fields?
2.
Explain the concepts of prime and relative prime numbers with examples?
3.
Explain about modular arithmetic with examples
?
4.
Explain about the Fermats theorem?
5.
Explain about the Euler's Theorem?
6.
Explain about the chines remainder theorem?
7.
Explain about the discrete logarithms?
UNIT

4
1.
Explain about the principles of Public Key Cryptography with Diagram?
2.
Explain the procedure
involved in RSA public

key encryption algorithm?
3.
What are the possible attacks on RSA, explain?
4.
What is the purpose of Diffie Hellman Key exchange explain with example?
5.
Explain Man

in

the

Middle attack over Diffie Hellman Key exchange?
6.
Explain about the
Elliptic

Curve Cryptography (ECC)?
UNIT

5
1.
Explain the approaches for message authentication?
2.
What is the use of Hash Function explain with example?
3.
Explain about the message digest using SHA

1 (Secure Hash Algorithm)?
4.
Distinguish different hash functions?
5.
Explain about HMAC structure ?
6.
Explain about the digital signature and schemes?
7.
Explain about various authentication protocols?
UNIT

6
1.
Explain about the authentication applications?
2.
What is the use of Kerbros, explain the working of Kerbros?
3.
Explain abou
t the key management and Key Distribution?
4.
Explain about the X.509 Directory authentication Services?
5.
Explain about operational descriptions of Pretty Good privacy Protocol, with a diagram?
6.
Explain about the S/MIME, in detail?
UNIT

7
1.
Explain about IPV4
and IPV6 Header formats with block diagrams?
2.
Explain about the IP Security Architecture?
3.
Explain about the IP Security Services?
4.
Explain about the Authentication Header with Transport and Tunnel Modes?
5.
Explain about the Encapsulating Security Payload with
diagram?
6.
Explain about Key management?
7.
Explain about the SSL Architecture?
8.
Explain about the TLS Protocol?
9.
Explain about Secure Electronic Transactions?
10.
Explain about the payment processing?
UNIT

8
1.
Explain different Types of intruders?
2.
Explain about the i
ntrusion techniques ?
3.
Explain with neat diagram the UNIX password scheme?
4.
Explain how intrusion is detected? and also measure used for intrusion detection?
5.
Explain about different types of Viruses?
Explain about the antivirus approaches, and advanced
approa
ches?
Comments 0
Log in to post a comment