You are on page 1of 1

Reg.

No

Sona College of Technology (Autonomous), Salem -5.


Department of CSE
Continuous Internal Evaluation Test – 3
SET – 2 U19CS702 Cryptography
Common to All sections ( IV Year / Semester)

Date : Duration : 1 ½ hours

Outcomes
Levels of

Course
B.T
Time slot : 09.15 To 10.45 am/pm Marks : 50
PART – A Answer All Questions (6 x 2 = 12 Marks)
1. State the requirements of digital signatures. LOTS 4

2. What are the design objectives of HMAC? LOTS 4

3. State the protocol which suppresses the replay attacks and at the same time fix the problem of HOTS 4
Needham/Schroeder protocol.
4. What do you mean by Bastion Host? LOTS 5

5. Identify the security parameters that may be applicable when analyzing e-mail security HOTS 5

6. List out the features and usage of a good password. HOTS 5

PART – B Answer All questions (2 x 5 = 10 Marks)


7. Summarize the authentication dialogue used by Kerberos V4 for obtaining services. HOTS 4

8. Describe how PGP provides confidentiality and authentication services for email application LOTS 5

PART – C Answer All questions (2 x 14 = 28 Marks)


9. (a) (i) Explain the process of generating the message digest value using MD5 algorithm with 7 LOTS 4
necessary diagrams and steps.
(ii) Consider secret keys Ka and Kb are shared between A & KDC and B & KDC. 7 HOTS 4
Apply Needhem Schroder protocol to distribute session key Ks to A and B.
(OR)
(b) (i) What are the various ways of using hash functions in message authentication? 7 LOTS 4
Explain them with neat diagram.
(ii) Explain the requirements of digital signatures and analyze how problems related to 7 HOTS 4
digital signatures can be taken care of using an arbiter.

10. (a) (i) Explain the phases of SSL handshake protocol for 7 LOTS 5
a. Establishing security capabilities
b. Server authentication and key exchange
c. Client authentication and key exchange
(ii) A device with 192.168.1.147 tries to connect to a device with IP 7 HOTS 5
(192.0.9.40) ,then the connection is first verified by firewall that completes the
TCP three way handshaking process and if there is a consequent traffic arises
then how it will be detected using packet filtering method?
(OR)
(b) (i) Explain the functions of S/MIME 7 LOTS 5

(ii) Apply the Statistical Anomaly method for legitimate user where statistical tests are 7 HOTS 5
applied to observed behavior with a high level of confidence.
Bloom’s LOTS HOTS To
Percentage 50 50 1

You might also like