Crypto Super-Imp-Tie-23
Crypto Super-Imp-Tie-23
Crypto Super-Imp-Tie-23
Module-1(study any 6)
1. Define/Explain i)Caesar Cipher with example ii) Cryptography iii) Cryptology iv) Cryptanalysis
2. Differentiate between – i) Stream and block ciphers ii)Diffusion and Confusion
iii) Symmetric and Asymmetric Cipher Systems
3. Explain Playfair Cypher with its rules and examples.
4. Describe Hill Cipher Technique with an example.(both encryption and decryption)
5. Explain Feistel Structure and Traditional structure of Block Cipher
6. Briefly explain Symmetric Cipher Model with block diagram
7. Write a note on Substitution and Transposition
Module-3
1. Explain symmetric key distribution using : i) Symmetric Encryption ii) Asymmetric Encryption
2. Explain analog of Diffie Hellman Key Exchange
3. Write a note on (i) Abelian groups and elaborate on Elliptic Curve Cryptography (ii) Key Distribution
scenario (iii)issues with KDC - 5M/Q
4. Explain different techniques of distribution of Public Keys
5. With a neat diagram, explain Pseudo Random Number Generation based on RSA.
6. Simple problems on Elliptic Curve Arithmetic.
7. Explain Elliptic curve over Real Numbers.
Module-2
1. Write a note on (i)Email threats (ii)S/MIME certificate processing (iii)DKIM (iv)MIME - 5M/Q
2. With a neat diagram explaining Public key Infrastructure.
3. Justify DKIM functional flow
4. Define Kerberos, depict the overview of Kerberos, State any three Difference between Kerberos 4 and 5.
5. With a neat diagram explain different fields in X.509 certificate format
6. With a neat diagram explain the different key components of the Internet mail architecture
7. Explain confidentiality and authentication services provided by PGP protocol
8. Explain Remote User authentication principles.
1. What is IPsec? Define different Benefits of IPsec and Categories of IPsec Documents
2. Briefly explain processing model for Outbound and Inbound packets with a diagram
3. Explain the different fields in an ESP packet format with a figure
4. With a neat diagram explain basic combinations of security associations
5. Explain the scenario of IPsec usage with a diagram
6. Briefly explain tunnel mode and transport mode ESP with a neat diagram
7. Explain the basic combinations of security associations
8. Describe IKE header and payload format.