How To Exam?

a knowledge trading engine...


SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper

Thursday, 31 January 2013 12:05Web
6. What is the difference ranging from a message authentication code and a one-way hash
function?
7. What is the difference ranging from weak and strong collision resistance?
8. What basic arithmetical and logical functions are used in SHA-1?
9. What basic arithmetical and logical functions are used in MD-5?
10. What basic arithmetical and logical functions are used in RIPEMD-160?
11. What is the difference ranging from little-endian and big-endian format?
12. elaborate the properties a digital signature should have?
13. How is the public key computed from the private key in DSA?
14. How many additive constants are there in MD-5, SHA-1 and RIPEMD-160?
15. Draw the DSS approach for generating digital signature.
16. Write about brute-force attack on hash function.
17. For SHA - one algorithm show the values of w16 and w17.

PART B

1. (a) explain the basic uses of message encryption with neat block diagrams.
(b) explain the basic uses of message authentication code (MAC) in
authentication and confidentiality with neat block diagrams.
2. discuss the requirements for MAC and hash function.
3. (a) discuss the basic uses of hash function in message authentication.
(b) Write short notes on birthday attack.
4. Compare SHA-1, MD-5 and RIPEMD-160 algorithm.
5. discuss the DSS algorithm and provide the proof of it.
6. explain in detail the operation of MD5 message digest algorithm and its
compression function with neat diagrams.
7. discuss in detail the processing of message using RIPEMD-160 message digest
algorithm and discuss the details of its single step.
8. discuss the message processing and compression function of SHA-1 in detail.
9. discuss the major groups of attack on MAC and hash functions with conventional
and public key encryption.

UNIT V
PART A

1. What issue was kerberos designed to address ?
2. elaborate the 3 threats associated with user authentication over a network or
internet?
3. List 3 approaches to secure user authentiucation in a distributed environment.
4. What 4 requirements were described for kerberos?
5. elaborate the 5 principal services given by PGP?
6. Why does PGP generate a signature before applying compression?
7. What is R64 conversion?
8. Why is the segmentation and reassembly function in PGP needed?
9. What is S/MIME?
10. provide the general format of PGP message.
11. What is PGP?
12. provide the uses of IPSecurity?
13. elaborate the benefits of IPSecurity?
14. provide the overview of IPSec documents.
15. elaborate the major IPSec services?
16. What is the security association?
17. What is anti- reply mechanism in authentication header?
18. provide the format of Ipv4 packets after applying AH in transport mode.
19. provide the format of Ipv6 packets after applying AH in transport mode.
20. elaborate web security threats?
21. provide the uses of web security.
22. provide the SSL protocol stack
23. What is SSL session and SSL connection?
24. provide the SSL record format.
25. elaborate the 3 SSL specific protocols?
26. What is SET?
27. elaborate the 3 main services of SET?
28. Who are the participants in SET system?
29. elaborate the roles of the Oakley key determination protocol in IPSec?
30. elaborate the roles of the ISAKMP in IPSec?

PART B

1. discuss the Kerberos version four architecture dialogue and summarize its message exchanges.
2. discuss PGP and write about cryptographic keys and key rings.
3. discuss the subsequent PGP services
i. Authentication
ii. Confidentiality
iii. Compression
iv. E-mail compatibility
v. Segmentation
4. With suitable diagram discuss the transmission and reception of PGP messages.
5. discuss the subsequent
i. Benefits of IP-security
ii IPSec services
iii. ESP formats.
iv. Transport mode ESP
6. discuss the transport and tunnel modes of operation in both AH and ESP with
diagrams describing the packet form.
7. discuss the IP Security architecture in detail.
8. explain about SSL architecture and SSL record protocol.
9. discuss security in transport layer.
10. discuss secure electronic transaction.
11. discuss the S/MIME functionality in detail with sample messages.
12. discuss the default automated key management protocol for IPSec
13. provide the formats, discuss the different payloads and exchanges of ISAKMP.






( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper