You are on page 1of 4

Om Sakthi

Adhiparasakthi Engineering College,


Om Sakthi
Melmaruvathur-603319
Adhiparasakthi Engineering College,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Melmaruvathur-603319
Academic Year (2018 -2019) ODD Semester
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT TEST – 1 Academic Year (2018 -2019) ODD Semester
CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
INTERNAL ASSESSMENT TEST – 1
Set -1
IV-Year & VII -Semester Max.Marks:50 CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
Set -1
Date: 17.08.2018 Time:11/2 Hrs
IV-Year & VII -Semester Max.Marks:50
Date: 17.08.2018 Time:11/2 Hrs
PART A (Answer all the Questions) (5*2=10)
1. What is cryptanalysis and cryptography? PART A (Answer all the Questions) (5*2=10)
2. Define Brute-Force attack.
1. What is cryptanalysis and cryptography?
3. How does simple columnar transposition work?
2. Define Brute-Force attack.
4. Give the transformation of a message using rail fence technique. “The
3. How does simple columnar transposition work?
International Data Encryption Algorithm is perceived as one of the
4. Give the transformation of a message using rail fence technique. “The
strongest cryptographic algorithms”.
International Data Encryption Algorithm is perceived as one of the
5. What are the roles of firewalls.
strongest cryptographic algorithms”.
5. What are the roles of firewalls.
PART B (Answer any two Questions) (2*13=26)
6. Explain OSI Security architecture in detail. PART B (Answer any two Questions) (2*13=26)
7. Use a Hill cipher to encipher the message “HELLO”. Use the following 6. Explain OSI Security architecture in detail.
7. Use a Hill cipher to encipher the message “HELLO”. Use the following
key K= Show the calculations for the corresponding decryption

of the cipher text to recover the original plaintext. key K= Show the calculations for the corresponding decryption
8. Discuss the classical cryptosystems (substitution and of the cipher text to recover the original plaintext.
transposition) and its types. 8. Discuss the classical cryptosystems (substitution and
transposition) and its types.
PART C (Compulsory) (1*14=14)
9. Write in detail the characteristics, types and limitations of PART C (Compulsory) (1*14=14)
Firewalls.
9. Write in detail the characteristics, types and limitations of 9. write short notes on the architecture and certificate mechanisms in
Firewalls. Kerberos version.

Om Sakthi Om Sakthi
Adhiparasakthi Engineering College, Adhiparasakthi Engineering College,
Melmaruvathur-603319 Melmaruvathur-603319
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Academic Year (2018 -2019) ODD Semester Academic Year (2018 -2019) ODD Semester
INTERNAL ASSESSMENT TEST – 1 INTERNAL ASSESSMENT TEST – 1
CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
Set -2 Set -2
IV-Year & VII -Semester Max.Marks:50 IV-Year & VII -Semester Max.Marks:50
Date: 17.08.2018 Time:11/2 Hrs Date: 17.08.2018 Time:11/2 Hrs

PART A (Answer all the Questions) (5*2=10) PART A (Answer all the Questions) (5*2=10)
1. What is avalanche effect? 1. What is avalanche effect?
2. What are the types of security attacks? 2. What are the types of security attacks?
3. Compare stream cipher and block cipher with example. 3. Compare stream cipher and block cipher with example.
4. Find gcd (56, 86) using Euclid’s algorithm. 4. Find gcd (56, 86) using Euclid’s algorithm.
5. Define Kerberos. Give 4 requirements of Kerberos. 5. Define Kerberos. Give 4 requirements of Kerberos.

PART B (Answer any two Questions) (2*13=26) PART B (Answer any two Questions) (2*13=26)
6. Convert “MEET ME” using Hill cipher with the key matrix. 6. Convert “MEET ME” using Hill cipher with the key matrix.

7. Explain play fair cipher and apply on plain text “University of Pune” & use 7. Explain play fair cipher and apply on plain text “University of Pune” &
keyword as “Attack”. use keyword as “Attack”.
8. Explain in detail about firewall configuration. 8. Explain in detail about firewall configuration.
PART C (Compulsory) (1*14=14) PART C (Compulsory) (1*14=14)
9. write short notes on the architecture and certificate 9. Explain the technical details of firewall and describe any 3 types of
mechanisms in Kerberos version. firewall with neat diagram.

Om Sakthi
Adhiparasakthi Engineering College, Om Sakthi
Melmaruvathur-603319 Adhiparasakthi Engineering College,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Melmaruvathur-603319
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Academic Year (2018 -2019) ODD Semester
Academic Year (2018 -2019) ODD Semester

INTERNAL ASSESSMENT TEST – 1


CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY INTERNAL ASSESSMENT TEST – 1
Set -3 CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
IV-Year & VII -Semester Max.Marks:50 Set -3
Date: 17.08.2018 Time:11/2 Hrs IV-Year & VII -Semester Max.Marks:50
Date: 17.08.2018 Time:11/2 Hrs

PART A (Answer all the Questions) (5*2=10)


PART A (Answer all the Questions) (5*2=10)
1. Computer Security, Network Security, Internet Security.
2. Compare active and passive attack. 1. Computer Security, Network Security, Internet Security.
3. Specify the Components of encryption algorithm. 2. Compare active and passive attack.
4. Define List the properties of Congruence. 3. Specify the Components of encryption algorithm.
5. Define firewall configurations and give its types. 4. Define List the properties of Congruence.
5. Define firewall configurations and give its types.

PART B (Answer any two Questions) (2*13=26)


PART B (Answer any two Questions) (2*13=26)
6. Describe in detail the various security mechanisms.
6. Describe in detail the various security mechanisms.
7. State and prove the chinese remainder theorem. What are the last
7. State and prove the chinese remainder theorem. What are the last
2 digits of 4919.
2 digits of 4919.
8. Describe: Playfair cipher, Railfence cipher, Vignere cipher.
8. Describe: Playfair cipher, Railfence cipher, Vignere cipher.
PART C (Compulsory) (1*14=14)
PART C (Compulsory) (1*14=14)
9. Explain the technical details of firewall and describe any 3
types of firewall with neat diagram.

You might also like