ST.ANNS COLLEGE OF ENGINEERING & TECHNOLOGY:: CHIRALA DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

wanderooswarrenAI and Robotics

Nov 21, 2013 (3 years and 8 months ago)

73 views




ST.ANNS COLLEGE OF ENGINEERING & TECHNOLOGY:: CHIRALA

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

SUBJECT:

CRYPTOGRAPHY & NETWORK SECURITY



BRANCH: IV CSE

FACULTY:
K.SUBBARAO






YEAR: 2013
-
14

ASSIGNMENTS


UNIT
-

1

1.

What is Security attack? Explain about various security attacks?

2.

What is security Service? Explain about the security services?

3.

What is Security Mechanism? Explain about the security Mechanisms?

4.

What are the Protocol
Vulnerabilities, explain in detail?

5.

Write Short notes on the following software Vulnerabilities?



Session Hijacking




Buffer Overflow



Format String Attack



AQL Injection

6.

Explain with neat diagram, the model of Network Security?

7.

Briefly explain the basics of t
he Cryptography, with Symmetric Cipher Model?

8.

Explain different types of attacks involved in Cryptanalysis and Brute
-
Force attack?

9.

Explain in detail about the following Substitution Ciphers?

a.

Julius Caesar Cipher

b. Monoalphabetic Cipher

c. Playfair Ciph
er

d. Hill Cipher




e. Polyalphabetic Cipher

f. One Time Pad

10.

Explain about Transposition Ciphers, with example?

11.

Explain with example the concepts of Confusion and Diffusion?

UNIT
-

2

1.

Explain about the secret key Cryptography along with its principles?

2.

Explain about the Data Encryption Standard (DES) with diagram? and its Strengths?

3.

Explain about the Feistel Cipher Structure?

4.

Explain about the block cipher model principles and operations?

5.

Explain Triple DES with example?

6.

Write short notes on the followin
g Symmetric Ciphers

a.

IDEA

b. Blowfish

c. RC5

d. CAST 128


7.

Explain the AES algorithm?

UNIT
-

3

1.

Explain about the Groups, Rings , and Fields?

2.

Explain the concepts of prime and relative prime numbers with examples?

3.

Explain about modular arithmetic with examples
?

4.

Explain about the Fermats theorem?

5.

Explain about the Euler's Theorem?

6.

Explain about the chines remainder theorem?

7.

Explain about the discrete logarithms?




UNIT
-

4

1.

Explain about the principles of Public Key Cryptography with Diagram?

2.

Explain the procedure

involved in RSA public
-
key encryption algorithm?

3.

What are the possible attacks on RSA, explain?

4.

What is the purpose of Diffie Hellman Key exchange explain with example?

5.

Explain Man
-
in
-
the
-
Middle attack over Diffie Hellman Key exchange?

6.

Explain about the
Elliptic
-
Curve Cryptography (ECC)?

UNIT
-

5

1.

Explain the approaches for message authentication?

2.

What is the use of Hash Function explain with example?

3.

Explain about the message digest using SHA
-
1 (Secure Hash Algorithm)?

4.

Distinguish different hash functions?

5.

Explain about HMAC structure ?

6.

Explain about the digital signature and schemes?

7.

Explain about various authentication protocols?

UNIT
-

6

1.

Explain about the authentication applications?

2.

What is the use of Kerbros, explain the working of Kerbros?

3.

Explain abou
t the key management and Key Distribution?

4.

Explain about the X.509 Directory authentication Services?

5.

Explain about operational descriptions of Pretty Good privacy Protocol, with a diagram?

6.

Explain about the S/MIME, in detail?

UNIT
-

7

1.

Explain about IPV4
and IPV6 Header formats with block diagrams?

2.

Explain about the IP Security Architecture?

3.

Explain about the IP Security Services?

4.

Explain about the Authentication Header with Transport and Tunnel Modes?

5.

Explain about the Encapsulating Security Payload with
diagram?

6.

Explain about Key management?

7.

Explain about the SSL Architecture?

8.

Explain about the TLS Protocol?

9.

Explain about Secure Electronic Transactions?

10.

Explain about the payment processing?

UNIT
-

8

1.

Explain different Types of intruders?

2.

Explain about the i
ntrusion techniques ?

3.

Explain with neat diagram the UNIX password scheme?

4.

Explain how intrusion is detected? and also measure used for intrusion detection?

5.

Explain about different types of Viruses?
Explain about the antivirus approaches, and advanced
approa
ches?