Semester : SEMESTER 7
Subject : Cryptography and Network Security
Year : 2019
Term : MAY
Branch : COMPUTER SCIENCE AND ENGINEERING
Scheme : 2015 Full Time
Course Code : CS 409
Page:2
15
16
17
18
19
a)
b)
a)
b)
௦)
a)
b)
௦)
a)
b)
०)
(1102 Pages: 2
Illustrate MD 5 hash algorithm in detail
Consider a Diffie Hellman scheme with a common prime q = 11 and primitive
root a= 2.
i. Show that 2 is a primitive root of 11.
ii. If user A has public key Ya = 9, what is A’s private key?
iii. If user 8 has public key ولا = 3, what is the shared secret key K,
shared with A
Discuss Digital Signature Algorithm
PART 0
Answer any two full questions, each carries 12 marks.
What are the steps used for preparing an enveloped data and signed data in
MIME entity?
Discuss the message format of PGP.
How the integrity is achieved using ICV in Authentication Header.
Illustrate the relevance of dual signature in SET.
Discuss SSL record protocol operations.
What are the requirements of Encrypted Tunnels?
Give the significance of SA selectors in IPSec.
Why compression is done before encryption in PGP?
Discuss different Firewall configurations.
RK
Page 2of 2
(9)
(5)
(4)
(6)
(3)
(3)
(4)
(6)
(2)
(4)
(2)
(6)