You are on page 1of 1

Question Bank Module 4 and 5

Course: Cryptography Course Code: 18CS744

Note: The question bank serves as reference or study guide only

1 Explain Remote User- Authentication principles 10M


2 List 4 requirements that were defined by Kerberos. Assume a client C wants to 10M
communicate with a server S using Kerberos Version 4. How can it be achieved?
3 What is the role of Ticket Granting Server in Kerberos Version 4? 10M
4 Give a summary of Kerberos Version 4 Message Exchanges with a neat diagram 10M
and message exchanges. (or) Discuss elaborately how Kerberos Version 4
provides the different authentication services
5 What are the technical deficiencies in the Kerberos version 4 protocols? 10M
6 Explain with a diagram, how a client in one realm request for service in another 10M
realm. (or) Describe the authentication dialog used by Kerberos for obtaining
services from another realm.
7 Explain Kerberos Version 5 authentication dialogue. 10M
8 Describe the PGP Cryptographic Functions with a neat diagram. Or 10M
What is PGP? Examine how authentication and confidentiality is maintained
9 Give the reason for using PGP? 10M
Why does PGP generate a signature before Apply compression? With a neat
diagram, explain Transmission and Reception of PGP Messages
10 Define S/MIME. Explain the various headers defined in MIME. 10M
11 Explain the various S/MIME functions and Cryptographic Algorithms Used in 10M
S/MIME
12 Explain DKIM functional flow with a neat diagram. 10M
13 Draw a diagram to explain the IP security scenario and explain the benefits of 10M
IPsec (or) Draw a diagram to explain the IP security scenario and explain the
applications of IPsec.
14 Give the categorization of IPsec documents. Also list out the IPsec services. 10M
What do you mean by Security Association? Illustrate the parameters that 10M
identify the Security Association.
15 With a diagram explain the IPsec Architecture. Also explain the components 10M
SAD and SPD.
16 Draw and explain the IP Traffic Processing model for inbound and outbound 10M
packets.
17 With a neat diagram explain the top-level format of an ESP Packet. 10M
What is transport mode and tunnel mode authentication in IP? Describe how 10M
ESP is applied to both these modes?
18 With a neat diagram, explain the Basic combinations of Security Associations 10M
19 Explain the two types of key management supported by IPsec architecture. Also 10M
list the important features of IKE Key determination algorithm.
20 Explain IKE header and the payload formats with a help of a neat diagram. 10M

You might also like