Professional Documents
Culture Documents
UNIT 1:
1. Security principles
2. cryptosystem
3. security services
4. security attacks
5. security mechanisms
6. classical encryption techniques(ciphers)
7. sums on ciphers
8. rotor machines
9. steganography
UNIT 2:
1. SDES
2. DES
3. Modes of operations of DES(ECB,CFB,CFB,CBC,COUNTER MODE)
4. TRIPLE DES
5. AES
6. RSA, attacks on RSA, SUMS(encryption & decryption)
7. stream ciphers – RC4
UNIT 3:
1. key management schemes
2. diffie – Hellman key exchange
3. authentication functions
4. hash functions
5. MAC(Message authentication code)
6. hash algorithms
a) secure hash algorithm(SHA – 1 also called as SHA -160)
b) SHA – 512
c) MD5 – 128
7. birthday attacks
8. digital signature algorithm (DSA)
9. Elgamal
UNIT – 4:
1. Kerberos
2. X.509
3. PGP
4. S/MIME
5. IP SECURITY
6. WEB SECURITY
a) Secure socket layer(SSL)
b) Transport layer security(TLS)
c) Secure electronic transaction(SET)
UNIT – 5:
1. techniques for learning passwords
2. intrusion detection schemes
3. audit records, Trojan horse, honey pots(4 or 6 marks each)
4. distributed intrusion detection
5. password selection and management techniques
6. backdoor, logic bombs, zombies
7. life cycle, structure and types of viruses
8. virus counter measures
9. DOS,DDOS
10. firewall design principles and types of firewalls
11. firewall configuration
12. trusted systems
IT 1352- CRYPTOGRAPHY AND NETWORK
SECURITY ANNA UNIVERSITY PREVIOUS
YEAR QUESTION BANK QUESTION PAPER
B.E/B.Tech DEGREE EXAMINATION, NOV/DEC 2009
IT 1352- CRYPTOGRAPHY AND NETWORK SECURITY
Part A
Part B
11.(a).Explain the OSI security architecture along with the services available.
(Or)
11.(b).(i).Given 10 bit key K=1010000010. Determine K1,k2 where
P10=3 5 2 7 4 10 1 9 8 6
P8= 6 3 7 4 8 5 10 9
by using SDES key generation method.