Cns Course File
Cns Course File
COURSE FILE
FOR
CRYPTOGRAPHY AND NETWORK SECURITY
B.TECH
IV YEAR I SEMESTER
2015-16
PEO2
PEO3
COURSE OUTCOMES:
CO1: The learner will get good awareness regarding security and cryptography.
CO2: The learner will get good knowledge about block ciphers and symmetric
key cryptography
CO3: Gains good knowledge regarding digital signatures.
PO6
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
Lesson Plan
SNO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
TOPICS COVERED
Classical Encryption Techniques Introduction: Security attacks, services
& mechanisms, Symmetric Cipher Model, Substitution Techniques,
Transportation Techniques, Cyber threats and their defense( Phishing
Defensive measures, web based attacks, SQL injection & Defense
techniques)
Buffer overflow& format string
Vulnerabilities,TCPsessionhijacking(ARPattacks,routetablemodification)
UDPhijacking ( man-in-the-middle attacks)
Block Ciphers & Symmetric Key Cryptography: Traditional Block
Cipher Structure, DES, Block Cipher Design Principles
AES-Structure, Transformation functions, Key Expansion
Blowfish, CAST-128, IDEA, Block Cipher Modes of Operations
Number Theory & Asymmetric Key Cryptography: Number Theory
Prime and Relatively Prime Numbers
Modular Arithmetic, Fermats and Eulers Theorems
The Chinese Remainder theorem, Discrete logarithms.
Public Key Cryptography: Principles,
p u b l i c k e y c r y p t o g r a p h y a l g o r i t h m s , RSA Algorithms
Diffie Hellman Key Exchange, Elliptic Curve Cryptography.
Cryptographic Hash Functions & Digital Signatures : Application of
Cryptographic hash Functions, Requirements & Security
Secure Hash Algorithm, Message Authentication Functions,
Requirements & Security, HMAC & CMAC. Digital Signatures
NIST Digital Signature Algorithm. Key management & distribution.
User Authentication, Transport Layer Security & Email Security : User
Authentication: Remote user authentication principles, Kerberos
Transport Level Security: WebSecurityRequirements,
SecureSocket Layer(SSL)and Transport Layer
Security(TLS),Secure Shell(SSH)
Electronic Mail Security:PrettyGood Privacy(PGP) and S/MIME.
IP Security & Intrusion Detection Systems: IPSecurity:
IPSecurityOverview,IPSecurityArchitecture,
HOURS
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
AuthenticationHeader, EncapsulatingSecurityPayload,
CombiningSecurityAssociations and KeyManagement.
Firewalls: Characteristics, Types of Firewalls, Placement of Firewalls,
Firewall Configuration, Trusted systems.
2
2
UNIT-I
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both (a) and (b)
d) none of the mentioned
1. The following is an comment tag in HTML documentation
(a) < / this is a comment >
(c) <this is a comment >
(c) bgcolor
(d) align
(b) blockset
(c) webset
(d) pageset
9. ______is the process of ensuring that users submit only the set of characters
which you require.
(a) Data correction (b) Data checking (c) Data validation (d) Data deletion
10. In JavaScript, to extract a range of elements from an array the function is
(a) shift( )
(b) slice( )
(c) push( )
(d) reverse( )
(d) carot( ^ )
Essay type questions: 1. Compare and contrast HTML and DHTML with suitable examples.
2. What is Javascript? Explain the features of Javascript.
3. Explain about different lists used in HTML.
4. Explain about Cascading style sheets.
5. Explain about different tags used in HTML.
6. What is form validation? Explain with an example.
7. Explain about images and tables used in HTML.
8. Explain the concept of frames used in HTML.
UNIT-II
1. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
2. _______ is used to describe the structure of a document not the way that it is presented.
(a) PDF
(b) XML
(c)HTML
(d)RTF
(b) pointers
(c) trees
(d) pages
(b) SAX
(c) MOD
(d) DOM
(b) DHTML
(c) HTML
(d) XSL
8. To copy the target node from the input source to the output, the following
command is used.
(a) xsl : comment
(c) xsl : choose
c) HTTP
d) HTML
UNIT-IV
1. PHP files have a default file extension of_____
a) .html
b) .xml
c) .php
d) .ph
2. A PHP script should start with ___ and end with ___:
a) <php>
b) < ? php ?>
c) <? ?>
d) <?php ?>
3. Who is the father of PHP?
a) RasmusLerdorf
b) WillamMakepiece c) DrekKolkevi
d) List Barely
: 10
UNIT-V
1. Which of the following data types are preceded by a dollar sign ($) in Perl?
a) Scalar
b) Array
c) Hashes
b) defined?
c) defined
d) local
7. Variables that start with two '@' symbols are what kind of variables in Ruby
a) Local variable
c) Instance variable
b) Global variable
d) Class variable
Essay type questions: 1. Explain the creation of iterators in Ruby with examples.
2. Discuss the multi dimensional arrays in Ruby programming
3. With an example program explain Pattern Matching in Ruby.
4. Define class. Explain how to create a class and its objects in Ruby.
5. Discuss about simple I/O statements in Ruby.
6. Explain Hashes and Methods in Ruby with examples.
7. Explain the looping structures available in Ruby.
8. How would you declare and use a constructor in Ruby?
B. TECH. III YEAR II Semester
Branch : CSE
II MID TERM EXAMINATIONS-(2015-2016)
Sub: Compiler Design April 2012
Date: 20-04-2016 (FN)
Max. Time
: 1 Hr Max. Marks : 10
[5M]
[3M]
[2M]
3. a) Write the quadruple, triple, indirect triple notations for the statement
[3M]
a = b* -c+b* -c
b) Explain three different storage allocation strategies.
4. a) Explain loop optimization techniques in detail.
b) Explain the different issues in the design of a code generator.
[2M]
[3M]
[2M]