Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Record No: ACAD/R/27

Pimpri Chinchwad Education Trust’s


Pimpri Chinchwad College of Engineering Revision: 00

Date: 18/08/2023

CNS Question Bank

Unit-IV Reference
(Refer William stallings 6th edition)

1 Apply Symmetric Encryption algorithm to achieve confidentiality and pg-384


authentication

2 Apply Asymmetric Encryption algorithm to achieve confidentiality, pg-384


authentication and digital signature.

3 Discuss requirements of Message Authentication pg-382

4 Explain the use of hash functions for message authentication pg-343

5 Explain SHA-512 algorithm.

6 Explain the working of a single round of SHA-512 algorithm.

7 Explain the derivation of words required for the 80 rounds of the SHA-
512 algorithm.

8 Explain HMAC algorithm in detail along with a neat diagram. PG-395

9 Explain Digital Signature Algorithm. pg-426

10 Explain ElGamal Digital Signature Scheme in detail. pg424

11 Problems on ElGamal Digital Signature Scheme. pg425


Unit-V
(Refer William stallings 6th edition)

1 Explain Symmetric key distribution using symmetric key encryption. pg442

2 Explain Symmetric key distribution using Asymmetric key encryption. pg451

3 Explain various methods to distribute public keys. pg454

4
Explain the X.509 scheme for the generation of public key certificates.

5 pg459
Draw the general format of X.509 certificate and explain.

6 What is Kerberos realm? pg461

7 Explain Kerberos version 4 pg482

8 From web
Find the difference between Kerberos version 4 and 5.

Unit-VI
From Atul Kahate 2nd Edition

1 Explain Static and Dynamic Web Pages. Pg 266

2 Explain the Secure Socket Layer(SSL) along with its working.(Write all pg272
four phases)

3 Explain Record Protocol. pg280

4 Explain Transport Layer Security. pg284

5 Differentiate between SSL and TLS pg284

6 Explain Secure Hypertext Transfer Protocol. Pg 284


7 Explain the Secure Electronic Transaction process. Pg 286

8 Compare Secure Socket Layer (SSL) versus Secure Electronic Pg 298


Transaction (SET).

9 Explain IPSec protocols. Pg 452

10 Explain Internet Key Exchange Protocol. Pg 458

11 Explain modes of IPSec working. Pg 463

12 Explain Encapsulating Security payload. Pg 464

You might also like