Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

(Approved by AICTE, New Delhi and affiliated to Anna University Chennai)

Star Lion College of Engineering and Technology


(Approved by AICTE, New Delhi and affiliated to Anna University Chennai)
Manankorai, Thanjavur - 614 206.

Manankorai, Thanjavur - 614 206. B.E Degree Examination, March 2024


DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
B.E Degree Examination, MARCH 2024 CIA- I
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Course Code : CCS354 Year / Sem :III/ VI
CIA- I Course Name : Network Security Total marks:
Course Code : CCS354 Year / Sem: 50
III/VI Date : 19.03.2024/ AN
Course Name : Network Security Total marks: 50 PART – A
Date : 19.03.2024/ AN
PART – A Answer all the questions :- (10x2=20)

Answer all the questions :- (10x2=20) 1.Define Confidentiality.

1.Define Confidentiality. 2.What is meant by Masquerade?

2.What is meant by Masquerade? 3.Differ cryptanalysis vs cryptanalyst?

3.Differ cryptanalysis vs cryptanalyst? 4.What is meant by Brute force attack?

4.What is meant by Brute force attack? 5.Draw the diagram for Asymmetric key cryptography?

5.Draw the diagram for Asymmetric key cryptography? 6.What is meant by FCS?

6.What is meant by FCS? 7.Define digital signature.

7.Define digital signature. 8.Define Hash function.

8.Define Hash function. 9.Explain Rail Fence technique.

9.Explain Rail Fence technique. 10.List the types of substitution techniques available.

10.List the types of substitution techniques available.

PART – B PART – B

Answer all the questions :- (2x15=30) Answer all the questions :- (2x15=30)

11(a)Explain about substitution techniques in detail.(15) 11(a)Explain about substitution techniques in detail.(15)

(OR) (OR)

(b)Describe about the types of transposition techniques.(15) (b)Describe about the types of transposition techniques.(15)

12(a)Explain about message encryption authentication function.(15) 12(a)Explain about message encryption authentication function.(15)

(OR) (OR)

(b)(i)Describe about message authentication code technique.(8) (b)(i)Describe about message authentication code technique.(8)

(ii)Explain about hash function authentication technique.(7) (ii)Explain about hash function authentication technique.(7)

Star Lion College of Engineering and Technology

You might also like