You are on page 1of 3

Hall Ticket

No:

BVRIT HYDERABAD COLLEGE OF ENGINEEING FOR WOMEN


Nizampet Road, Bachupally, Hyderabad-500 090
IV B. Tech I Semester II Midterm Examinations, November - 2017
Information Security
Department of Information Technology

Date: 09/11/2017 FN Duration : 1 hour Max Marks: 10

Answer any two Questions. Each question carries equal marks.

Course Blooms
Q.No. Question Marks
outcomes level

Unit-IV
1 a) Explain X.509 authentication service in detail. C411.5 2
b) Discuss the importance and usefulness of biometric C411.4 3
authentication. 5

Unit-IV
2. a) Elaborate the services provided by PGP. C411.5 2

b) Describe how S/MIME provides email security at C411.4 3


commercial and organizational levels. 5

Unit-IV &V
3. a) Discuss two different types of key management techniques C411.5 Evaluating
3
which is mandated by IPSec architecture.
b) Justify the requirements for web security. C411.5 Analyzing 2

Unit-V
4. a) Explain technical details of firewall and describe any two C411.6 Applying
3
types of firewall
b) Classify different types of viruses and describe each of C411.6 Analyzing
them. 2

C411.1 Illustrate the concepts and principles of security Attacks, Services and Mechanisms.
C411.2 Evaluate applications of Cryptographic algorithms in real time scenarios.
C411.3 Demonstrate the techniques like Message authentication, Hash function and Public key
encryption.
C411.4 Solve the network security issues using available security solutions.
C411.5 Assess different key management techniques and solutions for web security.
C411.6 Analyze various case studies to identify the security vulnerabilities and prevention
techniques
Hall Ticket
No:

BVRIT HYDERABAD COLLEGE OF ENGINEEING FOR WOMEN


Nizampet Road, Bachupally, Hyderabad-500 090
IV B. Tech I Semester I Midterm Examinations, September - 2017
Information Security
Department of Information Technology
Date: 14/09/2017 FN Duration : 1 hour Max Marks: 10

Answer any two Questions. Each question carries equal marks.

Course
Blooms
Q.No. Question outcom Marks
level
es

Unit-I
1. a) Explain different type of security services with proper C411.1 Understan
2
example. d
b) Classify several substitution techniques and discuss each of C411.1 Understan
3
them. d

Unit-I & II
2. a) Explain network security model with a neat sketch. C411.1 Understa 2
nd
b) Justify the significance of block cipher modes and discuss C411.2 Evaluate 3
any one of the modes.

Unit-II
3. a) List the applications of public-key cryptosystems briefly. C411.2 Analyze 2
b) State RSA algorithm and perform encryption and C411.2 Analyze
3
decryption using RSA where p=13,q=11,e=7,m=5

Unit-III
4. a) Describe SHA-1 algorithm in detail. C411.3 Apply 3
b) Compare the performance of SHA-1with MD5 & HMAC. C411.3 Apply

C411.1 Illustrate the concepts and principles of security Attacks, Services and Mechanisms.
Apply
C411.2 Evaluate applications of Cryptographic algorithms in real time scenarios.
Evaluate
C411.3 Demonstrate the techniques like Message authentication, Hash function and Public key
Apply encryption.
C411.4 Solve the network security issues using available security solutions.
Create
C411.5 Assess different key management techniques and solutions for web security.
Evaluate
C411.6 Analyze various case studies to identify the security vulnerabilities and prevention
Analyse techniques

ASSIGNMENT QUESTIONS-1

1. Using this Playfair matrix M F H I/J K U N O P Q Z V W X Y E L A R G D S T B C encrypt this message:


“mustseeyou”

2. This problem explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of
random numbers between 0 and 26. For example, if the key is 3 19 5 ..., then the first letter of plaintext is encrypted with a
shift of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. Encrypt the
plaintext “sendmoremoney” with the key stream 9 0 1 7 23 15 21 14 11 11 2 8 9.

3. Using Rail fence technique,


encrypt the plain text “postponeattacktilllnotice” using 3 rows.

4. What are the differences between DES and AES?

5. Encrypt using RSA algorithm : p = 3; q = 11, e = 7; M = 5

ASSIGNMENT QUESTIONS-2

Why PGP does generate a signature before applying compression?

You might also like