You are on page 1of 13

SREE DATTHA INSTITUTE OF ENGINEERING & SCIENCE

Sheriguda(V), Ibrahimapatnam(M), Ranga Reddy Dist

Accredited by NAAC, Approved by AICTE, Affiliated to JNTUH

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

EC851PE: NETWORK SECURITY AND CRYPTOGRAPHY

Course Outcomes: Upon completion of the Course, the students will be able to:

Blooms
CO DESCRIPTION Taxonomy
Describe network security fundamental concepts and principles
C422.1 L-2 Understand

Encrypt and decrypt messages using block ciphers and network


C422.2 security technology and protocols L-2 Understand

Analyze key agreement algorithms to identify their weaknesses


C422.3 L-4 Analyze

Identify and assess different types of threats, malware, spyware,


C422.4 viruses, vulnerabilities L-2 Understand

Solve the message authentication, functions, algorithms,


C422.5 applications. L-3 Apply

Identify the virus, worms, firewalls and security services and the
C422.6 management of the security. L-2 Understand
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice - William Stallings, Pearson Education.
2. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH,2004.

REFERENCES:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.

2. Fundamentals of Network Security by Eric Maiwald (Dreamtech press)

3. Principles of Information Security, Whitman, Thomson.

4. Introduction to Cryptography, Buchmann, Springer

EC851PE: NETWORK SECURITY AND CRYPTOGRAPHY

PO PO P0 PO PO PO PO PO PO PO PO PO PSO PSO PSO


1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
2 3 2 2
C422.1
2 2 1 3 2 2 2 3 2
2 3 2 2
C422.2
3 3 3 3 3 2 2 3 3
2 3 2 2
C422.3
3 3 3 3 2 2 2 3 3 3
2 3 2 2
C422.4
3 3 3 3 2 3 2 3 3 3
2 3 2 2
C422.5
3 3 3 3 2 2 2 3 3 3
C422.6 2 3 3 3 2 2 2 3 3 3 2 3 2 2

1. Less Matched
2. Moderately matched
3. Highly matched
EC851PE: NETWORK SECURITY AND CRYPTOGRAPHY
ASSIGNMENT: 1

S.NO QUESTION CO/PO MAPPED BL


1 What is the difference between passive and C422.1 L2-
active security treats? Understand
2 Convert the following plain text message C422.1 L2-
P=0110111 into cipher text by using one-time Understand
pad cipher with key K=1011001.calculate both
encryption and decryption for the above
message.

.
3 Briefly define the classical encryption C422.2 L2-
techniques? Understand
4 Convert the following plain text message C422.2 L2-
P=”WE ARE IARE CSE STUDENTS” into Understand
cipher text with key K=”deceptive” with key
epetition.
5 Explain about block cipher principles? C422.2 L3-Apply

ASSIGNMENT: 2

S.NO QUESTIONS CO/PO BL


MAPPED

1 Enumerate the different steps of SHA to generate C422.3 L1- Remember


message digest?
2 Explain about the blowfish ? C422.3 L3-Apply
3 What is a key distribution center? C422.3 L4- Analyze

4 Explain the RC5 algorithm? C422.3 L3-Apply

5 Explain the triple DES ? C422.3 L2- Understand

ASSIGNMENT: 3

S.NO QUESTIONS CO/PO BL


MAPPED
1 What is Euler’s totent function? C422.4 L2- Understand

2 What is the difference between an index and C422.4 L3-Apply


a discrete algorithm?
3 What is the principal elements of a public C422.4 L3-Apply
key cryptosystem ? and three broad
categories?
4 What is a trapdoor one way function? C422.4 L4- Analyze

5 What requriments must a public key C422.4 L3-Apply


cryptosystem fulfill to be a secure
algorithm?

ASSIGNMENT: 4

S.NO QUESTIONS CO/PO BL


MAPPED
1 Explain about storage usage of message C422.5 L2- Understand
authentication?
2 What are some approaches to producing C422.5 L4- Analyze
message authentication?
3 What is the role of a compression function in C422.5 L2- Understand
a hash function?

4 why S/MIME is a security enhancement to C422.5 L2- Understand


MIME internet email format standard?

5 What problems was Kerberos designed to C422.5 L4- Analyze


address?

ASSIGNMENT: 5

S.NO QUESTIONS CO/PO BL


MAPPED

1 What services are provided by IPsec? C422.6 L4- Analyze

2 What is a replay attack? C422.6 L2- Understand


3 What is the difference between an SSL C422.6 L2- Understand
connection and an SSL session?
4 What is a dual signature and what is its C422.6 L2- Understand
purpose?
5 List and briefly define three classes of C422.6 L2- Understand
intruders.

SREE DATTHA INSTITUTE OF ENGINEERING & SCIENCE


DEPARTMENT OF ELECTRONICS & COMMUNICATION

QUESTION BANK: NS&C


Unit 1

S.NO QUESTIONS BLOOM COURSE


TAXONOMY OUTCOMES
1 Explain the followings: L-2 Understand C422.1
(a) Playfair cipher.
(b) Vernam cipher in detail.
2 Explain simplified DES with example. L-2 Understand C422.2
3 Write short notes on i) Steganography L-1 Remember C422.2
4 Explain classical Encryption techniques in detail. L-2 Understand C422.2
5 Write short notes on L-1 Remember C422.1
(a) Security services
(b) Feistel cipher structure
6 Explain the OSI security architecture. L-2 Understand C422.1

7 Explain various transposition ciphers in detail L-2 Understand C422.2

8 Explain the basic principle of rotor machine L-2 Understand C422.1

9 Explain in detail about Feistel cipher with L-2 Understand C422.2


diagram.
10 Explain classical encryption techniques with L-2 Understand C422.2
symmetric cipher model.
11 Explain steganography in detail. L-2 Understand C422.2

12 Convert “MEET ME” using Hill cipher with the L-2 Understand C422.1
key matrix Convert the cipher text back to
plaintext.
13 Write short notes on block cipher modes of L-2 Understand C422.2
operation
14 Discuss any four Substitution Technique and list L-4 Analyze C422.1
their merits and demerits.
15 Explain in detail about various types of attacks L-2 Understand C422.1
16 Explain in detail about various services provided L-2 Understand C422.1
by X.800
17 Explain in detail about various Mechanisms L-2 Understand C422.1
provided by X.800
18 Briefly explain the design principles of block L-3 Apply C422.2
cipher
19 Write short notes on L-1 Remember C422.1
(i)Fermat and Eluer’s theorem
(ii)Chinese Remainder theorem
20 Discuss with neat sketch a network security L-4 Analyze C422.1
model
21 Compare Substitution and Transposition L-6 Create C422.2
techniques.

22 Define security mechanism L-1 Remember C422.1

23 Define integrity and non repudiation. L-1 Remember C422.1

24 Explain active and passive attack with example. L-2 Understand C422.1

25 Define cryptography. L-1 Remember C422.1

26 Define Diffusion & Cnfusion. L-1 Remember C422.1

27 Define Reversible mapping L-1 Remember C422.1

28 Why network need security? L-1 Remember C422.1

Unit 2

S.NO QUESTIONS BLOOM TAXONOMY COURSE


OUTCOMES
1 Compare stream cipher with block cipher L-6 Create C422.3
with example.
2 Differentiate unconditionally secured and L-5 Evaluate C422.3
computationally secured .
3 Define Diffusion & Cnfusion. L-1 Remember C422.3

4 What are the design parameters of Feistel L-2 Understand C422.3


cipher network?

5 Define Product cipher. L-1 Remember C422.3

6 Explain Avalanche effect. L-2 Understand C422.3

7 Give the five modes of operation of Block L-2 Understand C422.3


cipher.

8 State advantages of counter mode. L-2 Understand C422.3

9 Define Multiple Encryption. L-1 Remember C422.3


10 Specify the design criteria of block cipher. L-3 Apply C422.3
11 Specify the basic task for defining a security L-3 Apply C422.3
service
12 What is the difference between link and end L-2 Understand C422.3
to end encryption?
13 What is traffic Padding? What is its purpose? L-2 Understand C422.3

14 List the evaluation criteria defined by NIST for L-3 Apply C422.3
AES?

15 What is Triple Encryption? How many keys L-2 Understand C422.3


are used in triple encryption?
16 List the schemes for the distribution of public L-2 Understand C422.3
keys.
17 Drawback of 3-DES. L-1 Remember C422.3

18 Explain Diffie Hellman key Exchange in detail L-3 Apply C422.3


with an example?
19 .Explain the Key Generation, L-3 Apply C422.3
Encryption and Decryption of DES
algorithm in detail.
20 .Explain the key management of public key L-3 Apply C422.3
encryption in detail.
UNIT-3

S.NO QUESTIONS BLOOMS TAXONOMY COURSE


OUTCOMES
1 Identify the possible threats for RSA algorithm L-4 Analyze C422.4
and list their counter measures
2 Perform decryption and encryption using RSA L-5 Evaluate C422.4
algorithm with p=3, q=11, e=7 and N=5
3 Draw the general structure of DES and explain L-1 Remember C422.4
the encryption decryption process
4 Describe about RC4 algorithm. L-2 Understand C422.4
5 Explain the Miller-Rabin algorithm. L-3 Apply C422.4
6 Explain ECC - Diffie Hellman key Exchange L-3 Apply C422.4
with both keys in detail with an example.
7 Explain the key management of public key L-3 Apply C422.4
encryption in detail.
8 What are the requirements and applications of L-2 Understand C422.4
public key? Compare conventional with public
key encryption.
9 Explain RSA algorithm in detail with an L-3 Apply C422.4
example?
10 Explain Diffie Hellman key Exchange in detail L-3 Apply C422.4
with an example?
11 .Briefly explain the idea behind Elliptic Curve L-5 Evaluate C422.4
Cryptosystem?
12 Explain the Key Generation, Encryption and L-3 Apply C422.4
Decryption of DES algorithm in detail.
13 .Explain in detail the key generation in AES L-3 Apply C422.4
algorithm and its expansion format.
14 . List out the attacks to RSA. L-1 Remember C422.4

15 State and explain the principles of public key L-2 Understand C422.4
cryptography?
16 .List the evaluation criteria defined by NIST for L-2 Understand C422.4
AES.
17 Explain prime and relatively prime numbers L-2 Understand C422.4

18 Explain modular arithmetic L-3 Apply C422.4


19 Explain fermat;s and euler’s theorems L-3 Apply C422.4
20 Explain testing for primality L-3 Apply C422.4
21 Explain euclid’s algorithm L-3 Apply C422.4
22 Explain Chinese remainder and discrete L-3 Apply C422.4
algorithms.
UNIT -4

S.NO QUESTIONS BLOOM TAXONOMY COURSE


OUTCOMES

1 What is message authentication? L-2 Understand C422.5

2 What are the requirements for message L-2 Understand C422.5


authentication?
3 Define the classes of message authentication L-1 Remember C422.5
function.
4 What you meant by hash function? L-2 Understand C422.5
5 Differentiate MAC and Hash function? L-4 Analyze C422.5
6 Any three hash algorithm. L-3 Apply C422.5
7 Explain the classification of authentication L-3 Apply C422.5
function in detail
8 Describe MD5 algorithm in detail. Compare its L-2 Understand C422.5
performance with SHA-1.
9 Describe SHA-1 algorithm in detail. Compare L-3 Apply C422.5
its performance with MD5 and RIPEMD-160
and discuss its advantages
10 Describe RIPEMD-160 algorithm in detail. L-4 Analyze C422.5
Compare its performance with
11 Describe HMAC algorithm in detail. L-4 Analyze C422.5
12 Write and explain the Digital Signature L-3 Apply C422.5
Algorithm
13 Briefly explain Deffie Hellman key exchange L-2 Understand C422.5
with an example.
14 Write and explain the digital signature L-3 Apply C422.5
algorithm. (8) (ii) Explain in detail Hash
Functions.
15 Compare the Features of SHA-1 and MD5 L-6 Create C422.5
algorithm.
16 Discuss about the objectives of HMAC and it L-3 Apply C422.5
security features.
17 How man in middle attack can be performed in L-2 Understand C422.5
Diffie Hellman algorithm.
18 Explain in detail EIGamal Public key L-3 Apply C422.5
cryptosystem.
19 Discuss clearly Secure Hash Algorithm(SHA) L-4 Analyze C422.5
20 Describe the MD5 message digest algorithm L-5 Evaluate C422.5
with necessary block diagrams
21 What requirements should a digital signature L-2 Understand C422.5
scheme should satisfy?
22 What are the properties a digital signature L-2 Understand C422.5
should have?
23 Distinguish between direct and arbitrated digital L-5 Evaluate C422.5
signature?
24 What is the difference between weak and strong L-3 Apply C422.5
collision resistance?
25 What is the role of compression function in hash L-3 Apply C422.5
function?
26 Differentiate internal and external error control. L-5 Evaluate C422.5

27 What you meant by MAC L-3 Apply C422.5

28 Compare MD5, SHA1 and RIPEMD-160 L-6 Create C422.5


algorithm
UNIT-5

S.NO QUESTIONS BLOOM TAXONOMY COURSE


OUTCOMES
1 Define Kerberos. L-1 Remember C422.6

2 What is Kerberos? What are the uses? L-2 Understand C422.6

3 What 4 requirements were defined by Kerberos? L-2 Understand C422.6

4 In the content of Kerberos, what is realm? L-2 Understand C422.6

5 What is the purpose of X.509 standard? L-4 Analyze C422.6

6 List the 3 classes of intruder? L-3 Apply C422.6

7 Define virus. Specify the types of viruses? L-1 Remember C422.6

8 What is application level gateway? L-2 Understand C422.6

9 List the design goals of firewalls? L-3 Apply C422.6

10 What are the steps involved in SET Transaction? L-2 Understand C422.6

11 Three types of firewall. L-2 Understand C422.6

12 Describe trusted system in detail L-1 Remember C422.6

13 Explain Intrusion detection. L-2 Understand C422.6

14 . Name some viruses & explain it. L-4 Analyze C422.6

15 Describe the familiar types of firewall L-3 Apply C422.6


configurations.
16 Explain the types of Host based intrusion L-3 Apply C422.6
detection. List any two IDS software available
17 Explain any two approaches for intrusion L-2 Understand C422.6
detection.
18 What are the positive and negative effects of L-3 Apply C422.6
firewall?
19 Explain the technical details of firewall and L-3 Apply C422.6
describe any three types of firewall with neat
diagram
20 Explain in detail about KDC. L-3 Apply C422.6

You might also like