Sunteți pe pagina 1din 2

Subject Code: MCA 451 USN:

JSS Mahavidyapeetha
JSS Science and Technology University
JSS Technical Institution’s Campus, Mysuru–570006

IV Semester MCA Degree


Semester End Examination - May 2018
Branch: MCA Name of the paper Setter: Dr. H.R. Chennamma

CRYPTOGRAPHY AND NETWORK SECURITY

Duration: 3 Hours Time: 9.30 A.M. to 12.30 P.M. Max. Marks: 100
Date: 31st May 2018 Day: Thursday

Course Outcomes (CO):


CO-1: Explore the need for computer security concepts.
Understand the principles and techniques of symmetric key encryption and public
CO-2:
key encryption.
CO-3: Understand the requirement and implementation of Hash and MAC.
CO-4: Appreciate PGP and S/MIME for E-mail security.
Understand Web Security, Secure Electronic Transaction, Intruder detection and
CO-5:
Firewalls

Note: Answer both PART-A and PART-B


PART-A
Q. CO Cognitive Question Marks
No Domain

With the aid of a functional schematic, explain the 7


1a CO1 Knowledge
general model for Network Security.

1b CO1 Knowledge Give an overview of OSI Security Architecture. 3

Write a block diagram and explain each step in a round


2 CO2 Comprehension 10
of DES.

3a CO3 Comprehension Discuss the requirements of Massage Authentication. 5

Explain, how Encryption helps to authenticate a


3b CO3 Synthesis 5
message?

Explain operational description of PGP for email


4 CO4 Comprehension 10
security.

Define SSL Session and SSL Connection. Briefly


5 CO5 Knowledge explain the parameters that define SSL Session state and 10
SSL Connection state.

Page 1 of 2
Subject Code: MCA 451 USN:

PART-B
Briefly explain methodology and significance of Play Fair
6 CO1 Application Cipher and encrypt the message “CRYPTOGRAPHY” by 10
using “LARGEST” as a keyword.
OR
Encrypt the message “SJCE MYSURU” using Hill
7 CO1 Application Cipher with the key [9 6; 5 7]. Show your calculations 10
and result.

In a public-key system using RSA, you intercept the


8a CO2 Application ciphertext C = 14 sent to a user whose public key is e = 7, 6
n = 33. What is the plaintext M?
Synthesis What are the requirements for the use of a public-key
8b CO2 certificate scheme? 4

OR
Explain AES Key Expansion Algorithm with the help of
9a CO2 Knowledge 8
a diagram.
Write the differences between stream cipher and block
9b CO2 Comprehension cipher. 2

10 CO3 Knowledge Explain the structure and algorithm of HMAC. 10

OR

11a CO3 Comprehension Discuss the security of Hash Function. 7

Knowledge & What is digital signature and how it is used in message


11b CO3 3
Synthesis authentication?

12 CO4 Knowledge Explain RFC 5322 framework and list its limitations? 10

OR

13a CO4 Knowledge Write a short note on IPSec Documents. 4

13b CO4 Evaluation Compare two operational modes of IPSec. 6

Briefly describe the sequence of events that are required


14 CO5 Comprehension 10
for a transaction in a SET System.
OR
What is a firewall? Explain the three common types of
15 CO5 Knowledge 10
firewalls.

Page 2 of 2

S-ar putea să vă placă și