0% found this document useful (1 vote)
274 views2 pages

21CS733 IMP Questions

Uploaded by

patrick Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
274 views2 pages

21CS733 IMP Questions

Uploaded by

patrick Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Module -1

1. Explain DES Encryption algorithm, with neat diagram


2. Explain Feistel encryption and Decryption algorithm, with neat diagram.
3. Explain the playfair cipher Algorithm and its rules for the following example. (08 Marks)
Keyword: MONARCHY and Plain text: Cryptography.
4. Define Substitution and Transposition techniques.
5. Draw the simplified model of symmetric encryption and explain it
6. Explain Caesar cipher with an example.
7. Distinguish between: i) Confusion and Diffusion ciphers ii) Block cipher and stream
ciphers.

8.

Module - 2:
1. Explain Public Key Cryptosystems.
2. Explain the description of the RSA algorithm.
3. Describe Elgamal Cryptographic systems.
4. Explain the requirements and applications for public key cryptography
5. With relevant diagram, explain Authentication and secrecy in public-key cryptosystem.
6. Explain the Diffie - Hellman key exchange algorithm.
7. Explain the Diffie - Hellman key exchange algorithm.

Module - 3
1. Explain Key distribution Scenario, with neat diagram.
2. Explain Public key authority technique proposed for the distribution of Public keys.
3. With a neat diagram, explain secret key distribution with confidentiality and
authentication.
4. Explain with neat diagram control vector encryption and decryption.

Module - 4
1. With a neat diagram, explain the general format of X.509 certificate.
2. Explain Kerberos version 4 message exchange with neat diagram.
3. Explain Kerberos version 5 message exchange with neat diagram.
4. Explain Remote user-authentication using symmetric encryption
5. Explain Remote user-authentication using asymmetric encryption
Module - 5
1. Describe the various header fields defined in MIME
2. Draw a diagram to illustrate IP security scenario and also explain benefits of IPsec.
3. Summarize the below: (10 Marks) i) IPSec documents ii) IPSec services.
4. Explain the concept of transport and tunnel modes.
5. With relevant diagram, describe IKE header and payload format.
6. List the important features of IKE KEY Determination algorithm.
7. Describe IP Security Architecture, with neat diagram.
8. Explain Basic Combinations of Security Associations.
9. Draw and explain the IP traffic processing model for inbound and outbound packets ***

You might also like