Professional Documents
Culture Documents
U19CS702 - Cryptography
PART – A
PART – B
1. Consider secret keys Ka and Kb are shared between A & KDC and B & KDC. Apply Needhem
Schroder protocol to distribute session key Ks to A and B.
2. Summarize the authentication dialogue used by Kerberos V4 for obtaining services.
3. How hash functions are used in message authentication? Discuss in detail about simple hash and
block chaining techniques.
4. Describe how PGP provides confidentiality and authentication services for email application
5. Explain the functions of S/MIME
6. Apply the analysis method used for intrusion in rule based IDS and anamoly IDS.
7. What are the requirements of digital signature? Discuss in detail about direct and arbitrate digital
signature
8. Apply the Statistical Anomaly method for legitimate user where statistical tests are applied to
observed behavior with a high level of confidence.
9. Describe shortly about the functions of Kerberos
10. Explain the process of generating the message digest value using MD5 algorithm with necessary
diagrams and steps.
11. What are the various ways of using hash functions in message authentication? Explain them with
neat diagram.
12. A device with 192.168.1.147 tries to connect to a device with IP (192.0.9.40) ,then the connection is
first verified by firewall that completes the TCP three way handshaking process and if there is a
consequent traffic arises then how it will be detected using packet filtering method?
13. Write a hypothetical dialogue for transmitting the message between client module and server module
with the help of Ticket Granting Service (TGS).
14. Explain the phases of SSL handshake protocol for
a. Establishing security capabilities
b. Server authentication and key exchange
c. Client authentication and key exchange
15. A firewall is to be configured to allow hosts in a private network to freely open TCP connections and
send packets on open connections. However, it will only allow external hosts to send packets on
existing open TCP connections or connections that are being opened (by internal hosts) but not allow
them to open TCP connections to hosts in the private network. In what way we can achieve the
minimum capability of the firewall?
16. An organization has four private networks interconnected across the internet. Hosts on the internal
networks use the internet for transport the data and tunnels at the security gateway to each internal
network. How Authentication Header (AH) works on this scenario for transport mode and tunneling
mode?
17. Explain the technical details of firewall and describe any three types of firewalls with examples
18. Enumerate the need for using firewalls to provide system security.