You are on page 1of 5

CRYPTOGRAPHY AND NETWORK SECURITY – Assignment-I Submission last date 15th March2024 Max.

Marks: 15

Note: * You can write white pages note book / A4 Sheets Only with Your Regd.No and Name Submission off line mode only

S.No Regd.No Name of the Student Assignment Question


1 vu21csen0100004 BORIGI HARSHINI Explain OSI Security Architecture
2 vu21csen0100028 PINDRATHI VINAY KUMAR List and define categories of security attacks and services

3 VU21CSEN0100031 PINNINTI JAYA ADITYA List and explain the security mechanisms
Draw a matrix that shows the relationship between security
4 vu21csen0100053 GAGANASAI BHOGI mechanisms and attacks
Define computer security. Give examples of recent computer
5 VU21CSEN0100083 KURELLA YASWANTH security attacks which you know
How would you test a piece of cipher text to determine
quickly if it was likely the result of a simple substation?
6 vu21csen0100092 EDIGA SRAVANI Explain
PAKALAPATI PRANEETH List and difference between Cryptography and cryptanalysis
7 vu21csen0100102 VARMA with example
Explain Classical Encryption Techniques with any one of the
8 vu21csen0100143 NAGUDALA SAILALITADITYA encryption techniques examples
KARETI SUDHAKAR SAI KUMAR
9 vu21csen0100164 REDDY Explain Caesar Cipher with an example
10 vu21csen0100206 THANDRA SAI PRABHA Explain Monoalphabetic Ciphers with an example
11 vu21csen0100268 KAKARLA SAI SATHVIK Explain Playfair Cipher with an example
12 vu21csen0100298 SURISETTI ANIRUDH Explain Hill Cipher with an example
CHEELI LALITHA SOWNDARYA
13 vu21csen0100309 DEEPTHI Explain Polyalphabetic Ciphers with an example
Explain Transposition Techniques with an example of rail
14 vu21csen0100321 KORADA JAYARAM fence technique
SRUNGAVARAPU LEELA
15 vu21csen0100337 PRAMODH Explain stream and block ciphers
16 VU21CSEN0100352 DHANUKONDA SAI SASANK Explain two categories of symmetric ciphers
Mention the block cipher design principles What is the
17 vu21csen0100369 NARAVA SUREKHA importance of key size and number of rounds in block ciphers
Explain the process of Encryption in DES. Comment on the
18 vu21csen0100421 MIRIYALA ANUROOP SARMA strength of DES
Mention the key size, block size and Mathematical operations
19 vu21csen0100422 RANGA LAKSHYA SATYA SAINI used by RC4 algorithm. Describe the RC4 encryption function
YAMMANURU DURGA
VENKATA SATYA SRAVAN
20 vu21csen0100423 REDDY What is meant by Man in the Middle attack?
What is triple DES? What is triple DES with two keys? What is
triple DES with three keys? Draw a diagram of TRIPLE DES
21 vu21csen0100435 YELLAMILLI VIJAY VARUN with two keys
22 vu21csen0100436 ANNAPUREDDY HEMA LASYA Explain the cryptanalysis of DES in detail
PERICHARLA RAVI VIKASH
23 vu21csen0100442 VARMA Differentiate between CFB and OFB modes
24 vu21csen0100467 MEREDDY KARTHIKEYA REDDY Explain the working of AES algorithm
State Fermat’s little theorem. What is the importance of this
25 vu21csen0100512 DASARI KEVINPAL theorem in RSA crypto system
KADIRI VENKATA SATYA SAI Let p = 7, q = 11. Assume ‘e’, find ‘d’, Encrypt the message
26 vu21csen0100975 TEJA “Hello World” using RSA algorithm
Define Euclidean algorithm. Write the pseudo code of the
algorithm. Use this algorithm to find the greatest common
27 vu21csen0101004 DURGASI DHEERAJ KUMAR divisor of 2740 and 1760
28 vu21csen0101005 MADDI NARENDRA KUMAR Explain RSA algorithm with example
Describe the possible attacks on Diffie Hellman key exchange
29 vu21csen0101022 KUPPILI ROSHINI mechanism
GUNDUMOGULA Use Fermat's Theorem to find a number x 85between 0 and
30 vu21csen0101023 VENKATESWARA RAO 28 with x 85 congruent to 6 modulo 29
31 vu21csen0101033 PONNADA SIVA CHARAN List and explain the principles of public key cryptosystems
Perform encryption and decryption using the RSA algorithm
32 vu21csen0101035 PANASA BHAVYA SRI PRIYA for the following:p = 3; q = 11, e = 7; M = 5
Perform encryption and decryption using the RSA algorithm
33 VU21CSEN0101036 VINNAKOTA DHARMA TEJA for the following: p = 5; q = 11, e = 3; M = 9
Perform encryption and decryption using the RSA algorithm
34 vu21csen0101038 M SRI SAI KARTHIK for the following:p = 7; q = 11, e = 17; M = 8
How keys are distributed in public key cryptographic
35 vu21csen0101041 KOLLA YOGENDRA SAIBALAJI algorithms?
Discuss the four possible approaches to attack the RSA
36 vu21csen0101052 KOTLA VIVEK algorithm
37 VU21CSEN0101061 GOLAGANI MOUNISH YADAV Explain Chinese Remainder Theorem
38 vu21csen0101069 MACHA PAVAN Explain the use of hash function for message authentication
39 vu21csen0101196 SAI NANDITHA PATNAIK What is the need for Digital Signatures?
What are the properties and requirements for a digital
40 vu21csen0101201 CHARAN CHETTY signature
CHINTAKAYALA MANISH Difference between conventional signature and digital
41 vu21csen0101432 KUMAR signature
42 vu21csen0101436 G VENKAT SOMU NAIDU Distinguish between HMAC and CMAC
List the main features of the SHA-512 cryptographic hash
43 vu21csen0101443 GULIPALLI HEMA SRI function
44 vu21csen0101444 SHYAM SRUJAN BUDDA What kind of compression function is used in SHA-512?
Is it possible to use a hash function to construct a block
45 vu21csen0101445 NAKKA KIRAN KUMAR cipher with a structure similar to DES?
Explain Message Authentication Requirements and What are
46 vu21csen0101446 PILLA SAI SANKAR the attacks related to message communication?
List and describe the steps involved in processing of a
47 vu21csen0101470 SINGAMPALLI RAMESH NAIDU message using SHA-512
48 VU21CSEN0101481 RAJANA CHAITANYA Explain Authenticated Encryption: CCM, GCM
Explain requirements for Message Authentication Codes
49 vu21csen0101511 KARTHIKEYA MIDATHANA HMAC, DAA and CMAC
50 vu21csen0101520 NISHEK RAJARSHI SRIDATHI Describe the trust management in X.509
51 vu21csen0101540 N PRANAV ROHITH Differentiate between SSL and TLS
What are the data types and subtypes in MIME? And also
52 vu21csen0101578 BANDARU HIMA SRI discuss the limitations of SMTP
53 vu21csen0101593 PATHIVADA THANOOJ KUMAR Explain types of firewalls
Differentiate between the transport mode and tunnel mode
of IP Sec and explain how authentication and confidentiality
54 vu21csen0101595 VARUPULA PURNA CHANDRA are achieved using IP Sec
What are the two levels of alerts? What action is taken by SSL
55 vu21csen0101602 DUGGINENI TARUN KUMAR when a fatal level is received? Explain
KAKITHAPALLI HARSHA In S/MIME, explain how Bob and Alice exchange the secret
56 vu21csen0101612 VARDHAN key for encrypting messages
Where would you place a web server in an organization
57 vu21csen0101639 POTLURI ISHWARYA VARSHITA assuming that you can use a network firewall and why?
What is the role of encryption in the operation of virus?
58 vu21csen0101644 SAI KUMAR BANTUPALLI Explain
59 vu21csen0101649 M SAIKISHORE Give the operational description of PGP
PEDIREDDI SAKETH
60 vu21csen0101671 SANYASIRAO List the limitations of SMTP/5322 scheme
61 vu21csen0101763 GUNA VARDHAN Explain IP security Policy and Encapsulating Security Payload
List and briefly define the three key objectives of computer
62 vu21csen0101766 TATI MANOHAR security
List and briefly define categories of passive and active
63 vu21csen0101784 CHARAN TEJ TELAKALAPALLI security attacks.
CHALLAGUNDLA VENKATA Explain the difference between an attack surface and an
64 VU21CSEN0101862 MANIKANTA attack tree.
65 VU21CSEN0102117 THOTAKORA VAIBHAVRAJ What is Euler’s totient function?
What is the difference between modular arithmetic and
66 VU21CSEN0102143 NEERAJ KARRI ordinary arithmetic?

You might also like