Professional Documents
Culture Documents
No:
Course Blooms
Q.No. Question Marks
outcomes level
Unit-IV
1 a) Explain X.509 authentication service in detail. C411.5 2
b) Discuss the importance and usefulness of biometric C411.4 3
authentication. 5
Unit-IV
2. a) Elaborate the services provided by PGP. C411.5 2
Unit-IV &V
3. a) Discuss two different types of key management techniques C411.5 Evaluating
3
which is mandated by IPSec architecture.
b) Justify the requirements for web security. C411.5 Analyzing 2
Unit-V
4. a) Explain technical details of firewall and describe any two C411.6 Applying
3
types of firewall
b) Classify different types of viruses and describe each of C411.6 Analyzing
them. 2
C411.1 Illustrate the concepts and principles of security Attacks, Services and Mechanisms.
C411.2 Evaluate applications of Cryptographic algorithms in real time scenarios.
C411.3 Demonstrate the techniques like Message authentication, Hash function and Public key
encryption.
C411.4 Solve the network security issues using available security solutions.
C411.5 Assess different key management techniques and solutions for web security.
C411.6 Analyze various case studies to identify the security vulnerabilities and prevention
techniques
Hall Ticket
No:
Course
Blooms
Q.No. Question outcom Marks
level
es
Unit-I
1. a) Explain different type of security services with proper C411.1 Understan
2
example. d
b) Classify several substitution techniques and discuss each of C411.1 Understan
3
them. d
Unit-I & II
2. a) Explain network security model with a neat sketch. C411.1 Understa 2
nd
b) Justify the significance of block cipher modes and discuss C411.2 Evaluate 3
any one of the modes.
Unit-II
3. a) List the applications of public-key cryptosystems briefly. C411.2 Analyze 2
b) State RSA algorithm and perform encryption and C411.2 Analyze
3
decryption using RSA where p=13,q=11,e=7,m=5
Unit-III
4. a) Describe SHA-1 algorithm in detail. C411.3 Apply 3
b) Compare the performance of SHA-1with MD5 & HMAC. C411.3 Apply
C411.1 Illustrate the concepts and principles of security Attacks, Services and Mechanisms.
Apply
C411.2 Evaluate applications of Cryptographic algorithms in real time scenarios.
Evaluate
C411.3 Demonstrate the techniques like Message authentication, Hash function and Public key
Apply encryption.
C411.4 Solve the network security issues using available security solutions.
Create
C411.5 Assess different key management techniques and solutions for web security.
Evaluate
C411.6 Analyze various case studies to identify the security vulnerabilities and prevention
Analyse techniques
ASSIGNMENT QUESTIONS-1
2. This problem explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of
random numbers between 0 and 26. For example, if the key is 3 19 5 ..., then the first letter of plaintext is encrypted with a
shift of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. Encrypt the
plaintext “sendmoremoney” with the key stream 9 0 1 7 23 15 21 14 11 11 2 8 9.
ASSIGNMENT QUESTIONS-2