Dear IV-IT-SVECW-CNS students
Assigments -1 on or before 4th August 2016
Roll Numbers for sets
SET1:
13B01A1246,50,51,53,60,63,71,77,78,83,84,85,86
SET2:
13B01A1245,56,57,59,62,64,65,66,68,72,73,75,76
SET3:
13B01A1244,47,48,49,52,54,55,61,69,70,74,80,82,10-64
13B01A1244,47,48,49,52,54,55,61,69,70,74,80,82,10-64
Cryptography and Network
Security
Assignment-1
SET-1
1. a) Briefly explain format
string vulnerabilities
b) b) Explain poly
alphabetic cipher technique with an example.
2. a) Computer and network
security is both fascinating and complex, what are the challenges
of Computer Security.
b) Explain the Distributed
Denial of Service
3. Draw the general structure
of DES and explain the encryption and decryption process in
detail?
4. Explain IDEA encryption and
decryption process in detail?
5. Briefly explain Elgamal
encryption & decryption.
6. Discuss the following
related to Elliptic Curve Cryptography(ECC)
i) ECC Encryption /
Decryption and Security of ECC ii) ECC Diffie Hellman Key Exchange
SET-2
1. a) Briefly explain Buffer
overflow vulnerabilities
b) Explain mono
alphabetic cipher technique with an example.
2. a) What is session
hijacking? Explain about TCP session hijacking in detail.
b) What is symmetric cipher
model? Explain simple substitution techniques with an example.
3. What is AES algorithm?
Explain different phases of AES algorithm.
4. Explain CAST-128 encryption
and decryption process in detail?
5. Explain RSA algorithm in
detail with an example.
6. a) Describe briefly Chinese
remainder theorem with an example.
b) State Euler’s theorem
and explain with example?
SET-3
1. a) Explain the Fiestel
cipher structure with a neat sketch. And also explain its importance.
b) Compare all the features
of stream and block ciphers.
2. a) What is session
hijacking? Explain about UDP session hijacking in detail.
b) What is symmetric cipher
model? Explain simple substitution techniques with an example.
3. With a neat sketch explain
Blowfish algorithm
4. Explain various block
cipher design ciphers and models of operation in detail.
5. a) Discuss various
principles of public key crypto Systems.
b) The public key crypto
Systems addresses certain problems of symmetric crypto systems.
What are those
problems explain in detail
6. Briefly explain
Diffie-Hellman key exchange protocol.
No comments:
Post a Comment