Cryptpgrahy Simp Tie
Cryptpgrahy Simp Tie
Cryptpgrahy Simp Tie
MODULE-V
1. What are the benefits and applications of IP security also explain IP Security policy
Security associations
2. Write short notes on i) Routing applications ii) IPsec
documents
3. Compare the Security association’s database with the Security
policy database.
4. Explain about IP security services with tunnel modes
5. Describe with neat block diagram Encapsulating Security
Payload
MODULE-II
1. With a neat block diagram, explain Public-key cryptosystems? Mention any two principles
4.. Perform encryption and decryption using the RSA algorithm and explain the
RSA process of multiple blocks.
5. Explain elaborately the Diffie-hellman key exchange algorithm
6. Alice wants to send a message to Bob, without Eve observing it. Alice and Bob have
agreed to use a symmetric cypher. The key exchange has already occurred, outline
the steps that Alice and Bob must follow when they encrypt and decrypt,
respectively.
1. Demonstrate encryption and decryption using RSA algorithm for the following: p=3
q=11 e=7 m=5
2. Explicate the Elgamal Cryptographic systems by using given data(G=3,P=101,K=6
M=5 X=2)
MODULE-III
5. Describe with neat block diagram Symmetric Key Distribution Using Symmetric
Encryption.
MODULE-IV
1. Discuss the X-509 Certificates
2. Write short notes on i) public key infrastructure ii) User
Authentication
MODULE-I
7. Using the Hill cypher technique encrypt and decrypt the text &keys using an
example
encryption algorithm
9. What are the roles of public and private keys? Differentiate between symmetrical
cypher system and asymmetrical cypher systems.