Você está na página 1de 3

CSE 323 Cryptography and Network Security

KALASALINGAM UNIVERSITY
(KALSALINGAM ACADEMY OF RESEARCH & EDUCATION)
KRISHNANKOIL – 626126

CHAPTER 09
PUBLIC KEY CRYPTOGRAPHY AND RSA

PART A

1. Compare Asymmetric Encryption and Symmetric encryption


2. List out the parameters involved in Public key encryption (Pg No:295)
3. List out the applications of Public Key Cryptosystem (Pg No: 291)
4. List out the five possible approaches for attacking RSA algorithm. (Pg No: 302)
5. Euler totient function

PART B

1. Write the algorithm of RSA and explain with an example. (16m) (Pg No: 295)
2. Perform Encryption/Decryption using RSA algorithm for the following: p=3, q=11, e=7,
m=5. (8m)
3. Identify the possible threats for RSA algorithm and list their counter measures.
(8)
4. Problems related to RSA. (9.2, 9.3, 9.4 page no. 309 7th edition)

UNIT II

CHAPTER 10
OTHER PUBLIC KEY CRYPTOSYSTEMS

PART A

1. State the use of Diffie Hellman Key exchange (Pg no: 317)
2. List out the two parameters involved in Diffie Hellman Key Exchange (Pg no: 315)
3. State the formula to calculate secret key in Diffie Hellman Key Exchange algorithm (Pg
no: 316)
4. Define Man in the Middle attack (Pg no: 317)

PART B

CSE 319 NETWORK SECURITY


CSE 323 Cryptography and Network Security

1. Write short notes on Diffie Hellman Key exchange algorithm[8M] (Pg no:317)

CHAPTER 11
CRYPTOGRAPHIC HASH FUNCTION

PART A

1. Define Hash function (Pg No: 340)


2. List out the applications of Cryptographic hash function (Pg No: 341)
3. Represent Digital Signature with a simple diagrammatic example. (Pg No: 356)
4. List out the steps involved in Secure Hash algorithm (Pg No: 368)
5. Define. Preimage resistant, second preimage resistant.(349)

PART B

1. Explain in detail about the applications of Cryptographic Hash function(8M) (Pg no: 353)
2. Describe the functions of SHA – 512 with necessary diagrams. (16M) (Pg no: 356)

CSE 319 NETWORK SECURITY


CSE 323 Cryptography and Network Security

CHAPTER 13
DIGITAL SIGNATURE

PART A

1. List down the properties of the Digital signature must have. (Page.No. 422)
2. List out some of the requirements of Digital Signature (Pg No: 423)
3. What are the approaches involved in Digital Signature standard? (Pg No: 427)
4. With a neat sketch, represent the RSA and DSS approach of Digital Signature. (Fifth
edition book Pg No: 428)

PART B

1. Write short notes on the following: [8M] [Pg No: 422]


a. Attacks & forgeries
b. Requirements for Digital Signature
2. Explain the two approaches to Digital Signature (Fifth edition book page no. 427) (8)

UNIT III
CHAPTER 15
USER AUTHENTICATION - KERBEROS

PART A

1. List down the four means of authenticating user’s identity (page no. 476)
2. Define. One way authentication.(478)
3. Define. Mutual authentication(477)
4. List out the three treats involved in Distributed environment (Pg no: 482)
5. Define Kerberos Realm (Pg no: 493)

PART B

1. Explain in detail about Kerberos Version4 message exchange with a neat sketch.(16M)
(Pg no: 484)
2. Write short notes on environmental and Technical limitations of Kerberos
Version4.(16M) (Pg no: 495)

CSE 319 NETWORK SECURITY

Você também pode gostar