Académique Documents
Professionnel Documents
Culture Documents
of the cipher text to recover the original plaintext. key K= Show the calculations for the corresponding decryption
8. Discuss the classical cryptosystems (substitution and of the cipher text to recover the original plaintext.
transposition) and its types. 8. Discuss the classical cryptosystems (substitution and
transposition) and its types.
PART C (Compulsory) (1*14=14)
9. Write in detail the characteristics, types and limitations of PART C (Compulsory) (1*14=14)
Firewalls.
9. Write in detail the characteristics, types and limitations of 9. write short notes on the architecture and certificate mechanisms in
Firewalls. Kerberos version.
Om Sakthi Om Sakthi
Adhiparasakthi Engineering College, Adhiparasakthi Engineering College,
Melmaruvathur-603319 Melmaruvathur-603319
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Academic Year (2018 -2019) ODD Semester Academic Year (2018 -2019) ODD Semester
INTERNAL ASSESSMENT TEST – 1 INTERNAL ASSESSMENT TEST – 1
CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY CS 6701 – CRYPTOGRAPHY AND NETWORK SECURITY
Set -2 Set -2
IV-Year & VII -Semester Max.Marks:50 IV-Year & VII -Semester Max.Marks:50
Date: 17.08.2018 Time:11/2 Hrs Date: 17.08.2018 Time:11/2 Hrs
PART A (Answer all the Questions) (5*2=10) PART A (Answer all the Questions) (5*2=10)
1. What is avalanche effect? 1. What is avalanche effect?
2. What are the types of security attacks? 2. What are the types of security attacks?
3. Compare stream cipher and block cipher with example. 3. Compare stream cipher and block cipher with example.
4. Find gcd (56, 86) using Euclid’s algorithm. 4. Find gcd (56, 86) using Euclid’s algorithm.
5. Define Kerberos. Give 4 requirements of Kerberos. 5. Define Kerberos. Give 4 requirements of Kerberos.
PART B (Answer any two Questions) (2*13=26) PART B (Answer any two Questions) (2*13=26)
6. Convert “MEET ME” using Hill cipher with the key matrix. 6. Convert “MEET ME” using Hill cipher with the key matrix.
7. Explain play fair cipher and apply on plain text “University of Pune” & use 7. Explain play fair cipher and apply on plain text “University of Pune” &
keyword as “Attack”. use keyword as “Attack”.
8. Explain in detail about firewall configuration. 8. Explain in detail about firewall configuration.
PART C (Compulsory) (1*14=14) PART C (Compulsory) (1*14=14)
9. write short notes on the architecture and certificate 9. Explain the technical details of firewall and describe any 3 types of
mechanisms in Kerberos version. firewall with neat diagram.
Om Sakthi
Adhiparasakthi Engineering College, Om Sakthi
Melmaruvathur-603319 Adhiparasakthi Engineering College,
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Melmaruvathur-603319
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Academic Year (2018 -2019) ODD Semester
Academic Year (2018 -2019) ODD Semester