Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CSS

MODULE 1
1] Define the goals of security and specify mechanisms to achieve each goal.
[5M*6,10M]
2] playfair cipher problem [5M*3,10M*2]
3] keyed and keyless transposition ciphers [5M*3]
4] Multiplicative cipher problem [5M]
5] Difference between Monoalphabetic and Polyalphabetic cipher [5M*2]
6] Hill cipher problem [10M*3]
7] Affine cipher problem [10M]
8] Any one transposition and substitution with example [10M]
9] Rules of finding euler's phi. calculate [5M*2]

MODULE 2
1] -RSA problem [10M*10]
-Explain RSA [5M]
-Key generation using RSA Algorithm [5M]
2] X 509 Digital certificate [5M*2,10M*3]
3] -Diffie Hellman Key [10M*6]
-Diffie Hellman Key problem [10M*5]
4] -DES [10M*9]
-S-box and avlanche effect [5M]
-Round key generation [5M]
-S-DES problem [10M]
-Compare AES and DES [5M,10M]
5] Triple DES [5M*2]
6] Working of Kerberos [5M*3,10M*7]
7]-Block cipher and modes of operation-CBC,ECB,OFB [5M*4,10M]
-Difference between Block and Stream ciphers [5M*2]
8] PKI [10*2]

MODULE 3
1]-Difference between MD-5 and SHA [5M*5]
-SHA-1 [5M*2]
-MD5 [10M]
-Why is padding done in MD5 and SHA [5M]
2] Hash functions [5M*7,10M*2]
3] HMAC [10M]
4] Provide comparison betn HMAC, CBC-MAC and CMAC [10M]

MODULE 4
1]-Digital Signature Algorithm [5M,10M*3]
-why are Digital certificates and Digital Signature required [5M,10M*5]
-Attacks on Digital Signature and method to overcome them [10M]
-RSA as digital signature scheme[10M]
2]-Authentication and non repudiation [5M*3,10M*2]
-message athentication need [10M*2]
-response based authentication tokens [5M]

MODULE 5
1]- What is Firewall and design principles/different types [5M*2,10M*5]
-Difference between Firewall and IDS [5M*4]
-IDS [5M,10M*5]
2]-Denail of service attack [5M*3,10M*5]
-DDOS [10M]
3] SSL Protocol. explain handshake protocol [5M*5,10M*6]
4] PGP [5M*6,10M*3]
5] IPSec [5M*2,10M*9]
6] IP Spoofing [5M]
7] ARPSpoofing [5M]
8] Packet sniffing [5M]

MODULE 6
1] Buffer Overflow Attack [5M*6]
2]-Viruses and their types [5M*2]
-Different type of Worms and Viruses. how do they propagate [10M*2]
3] SQL Injection attack [5M*3]
4] Vulnerabilities [5M*3]

You might also like