Ads Top

Solved Subjective Papers CS707 Network Security

Solved Paper CS707 Network Security

Subjective Papers CS707 Network Security.

  1. Describe chain certificates.
  2. What is the characteristic of strong stream cipher?
  3. Consider A 32-bit has function implanted as two 16-bit functions using XOR and RXOR. Is created checksum by concatenation the both detects all the odd parity errors? Explain. If these functions are used for authentication what will be the effectiveness of the authentication
  4. How is X509 certificate revoke?                                                                   
  5. Why the middle portion in 3DES Decryption rather than Encryption?        
  6. Consider A 32-bit hash function implanted as two 16-bit functions using XOR and RXOR. Explain. If these functions are used for authentication what will be the effectiveness of the authentication.
  7. What is one way function? How it is implemented in Cryptography?          
  8. The context of Kerberos, Explain the concept of realm.
  9. Describe one way function.
  10. If you are supposed to implement one-time pad encryption scheme, which requirements do you think, each pad fulfill so that it is unbreakable?
  11. Describe Cryptography components.
  12. What is X.509 standard?
  13. Data encryption standard
  14. Describe the Public key encryption.
  15. List and briefly describe the parts of digital certificates.
  16. Why encryption is on only use in ___ method, while others are used encryption and decryption also?
  17. Functionalities of HMAC and facilities?
  18. What are Payloads? How they can be harmful? Explain with example?
  19. Enlist DES five modes.
  20. Describe Concept of chain of certificate.
  21. What are the difference between active attacks and passive attacks?
  22. Describe Hash function authentication.
  23. Describe Digital signature.
  24. If you are using symmetric encryption algorithm, why you do favor and why you are against of this algorithm.
  25. Two Choices are given ECC and RSA, you are using ECC prove it is best one.
  26. Describe Security services.
  27. What Services provided by cryptosystem.
  28. Security measures to defend a harmful attack.
  29. Define Digital Signature.
  30. Define working and diagram of digital Signature.
  31. What is PKI and cryptosystem?
  32. What is pay load how they are harm?
  33. Define the component of asymmetric algorithm.
  34. What are the counter measures in security systems?
  35.  How Hash Function is used with DES?
  36. What types of attacks on Ciphers?
  37. Why the middle portion in 3DES Decryption rather than Encryption?
  38. What is One way function? How it is implemented in Cryptography?
Solution File 1 
Solution File 2
Solution file 3
Solution file 3




No comments:

Powered by Blogger.