sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if...

17
B.L.D.E.A’s V.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR Department of Information Science and Engineering I Assignment Subject : Cryptography, Network Security and Cyber Law Year : 2020 Sub Code : 17CS61 Semester : V Max Marks: 25/5=5 Q.No Marks CO RBT 1. What is cryptography? Explain the different types of attacks. 5 1 2 2. Explain the guiding principles followed by human being while making communication through internet. 5 1 2 3. Write the algorithm to find inverse of modulus using Euclid’s concept. 5 2 3 4. Explain the fiestel structure of DES with neat diagram. 5 2 2 5. Describe the encryption and decryption of messages using RSA operation. 5 2 2

Transcript of sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if...

Page 1: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Department of Information Science and EngineeringI Assignment

Subject : Cryptography, Network Security and Cyber Law Year : 2020Sub Code : 17CS61 Semester : V Max Marks: 25/5=5

Q.No Marks CO RBT1. What is cryptography? Explain the different types of attacks. 5 1 2

2. Explain the guiding principles followed by human being while making communication through internet.

5 1

2

3. Write the algorithm to find inverse of modulus using Euclid’s concept. 5 2 3

4. Explain the fiestel structure of DES with neat diagram. 5 2 2

5. Describe the encryption and decryption of messages using RSA operation.

5 2 2

Page 2: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Department of Information Science and EngineeringII Assignment

Subject : Cryptography, Network Security and Cyber Law Year : 2020Sub Code : 17CS61 Semester : V Max Marks: 25/5=5

Q.No Marks CO RBT1. Explain the digital certificate using X.509 certificate format 5 3 2

2. Describe the different types of public key infrastructure (PKI) with neat Diagram.

5 3

2

3. Explain the different types of authentications. 5 3 2

4.

Explain any one protocol used by key distribution centre with neat Diagram.

5 4 2

5. What is firewall? Explain the functions of firewall. 5 4 2

epartment of Information Science and EngineeringIII Assignment

Page 3: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Subject : Cryptography, Network Security and Cyber Law Year : 2020Sub Code : 17CS61 Semester : V Max Marks: 05

Q.No Marks CO RBT1. Activity on collecting real-time applications related to Cryptography,

Network Security and Cyber Law topic and presenting it. 5 1,2,

3,4, 5

2

Department of Information Science and EngineeringScheme & Solutions for III Assignment

Page 4: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Subject : Cryptography, Network Security and Cyber Law Year : 2019Sub Code : 15CS61 Semester : V

Date : 3/05/2019Duration : 1Hr. 10Min. Max Marks: 5

Department of Information Science and EngineeringScheme & Solutions for I IA Test

Subject : Cryptography, Network Security and Cyber Law Year : 2019Sub Code : 15CS61 Semester : V

Date :15/03/2019Duration : 1Hr. 10Min. Max Marks: 30

Q.No PART A Marks1. a). Explanation of the

Theft of sensitive information 8

Q.No Marks1. Collecting real-time applications related information of any to

topic on Cryptography, Network Security and Cyber Law Presenting it

3 2

Page 5: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

b)

Disruption of serviceIllegal access to or use of resourcesPhishing and pharming attacksSkimming attacksSide channel attacksDictionary attacks Above cyber-attacks.Access control – authentication and authorizationData protectionPrevention and detectionResponse, recovery and forensics

7

2. a).

b)

Explanation of the Monoalphabetic ciphersPolyalphabetic ciphers and alsoExplanation ofSecure keysPublic keys with suitable examples.The plain text is “N E T WO R K S E C U R I T Y” key is “C R Y P T O C R Y P T O C R Y”cipher text is “ P V RLH F M J C R N F K K A” using vigenere substitution method.

4

4

7

PART B3. a).

b)

The public key cryptography is C=Epu(M) Message M is encrypted using public key pu M= Dpr(C) Cipher text is decrypted using private key prExplanation of the RSA algorithm

The public key cryptography standard(PKCS)

The practical issues of RSA operation:• Generating primes• Side channel and other attack

- Modulus factorization- Small exponent attack- Side channel attack

2

6

3

4

4. a). The desirable hash properties are :

Page 6: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

b)

- one-way property- weak collision resistance- strong collision resistance- confusion + diffusion

The generic hash function construction.

Description of Diffie hellman key exchange operation with suitable example.

4

4

7

Department of Information Science and EngineeringII Internal Assessment Test

Subject : Cryptography, Network Security and Cyber Law Year : 2019Sub Code : 15CS61 Semester : V

Date :18/04/2019Duration : 1Hr. 10Min. Max Marks: 30 Note:- Solve any ONE full Question from each PART

Q.No PART A Marks CO RBT1. a).

b)Explain the functions of a Public Key Infrastructure(PKI)Discuss the different types of One-way Authentication with suitable examples.

7 8

3 3

2 2

2. a).

b)

Explain the key distribution centre Protocol Kerberos message sequence with neat diagram.What is biometrics? Explain the characteristics of a good biometrics.

8 7

3 3

2 3,2

PART B

Page 7: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

3. a).

b)

Describe how WEP will protect data and check integrity. Also explain the drawbacks of WEP in protect data.Explain the functions of firewall to provide network security.

8 7

4

4

2

2

4. a).

b)

Explain the Practical issues for placement of firewalls with neat diagram.Differentiate between Intrusion prevention versus detection.

9

6

4

4

2

3, 2

Department of Information Science and EngineeringScheme & Solutions for II IA Test

Subject : Cryptography, Network Security and Cyber Law Year : 2019Sub Code : 15CS61 Semester : V

Date :18/04/2019Duration : 1Hr. 10Min. Max Marks: 30

Q.No PART A Marks1. a).

b)

Explanation of the functions of a Public Key Infrastructure(PKI) Certificate creation, issuance, storage and archival Key generation and key escrow Certificate/key updation Certificate revocation

Types of One way Authentication are:1)password based Authentication

7

Page 8: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

2)certificate based authentication

Explanation of above diagrams.

1

1

3×2=6

2. a).

b)

Explanation of the key distribution centre Protocol Kerberos message Sequence.

A biometric is a biological feature or characteristic of a person that uniquely identifies him/her over his/her lifetime. The characteristics of a good biometric include the following:

Universality Uniqueness Permanence

6

2

1

6

PART B3. a). In WEP, the station authenticates itself to the AP using a challenge—response

protocol . Basically, the AP generates a challenge (nonce) and sends it to the station.

Page 9: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

b)

The station encrypts the challenge and sends it to the AP. The stream cipher, RC4, is used for encryption. Response From Station: the station computes a keystream, which is a function of a 40-bit shared secret, S, and a 24-bit Initialization Vector

(IV). The challenge is then XORed with the keystream to create the response. RESPONSE = CHALLENGE (XOR) KEYSTREAM(S, IV) The response together with the IV is sent by the station to the AP. The shared secret, S, is common to all stations authorized to use the

WLAN.Drawbacks:

All an attacker needs to do is to monitor a challenge—response pair. From this, he can compute the keystream. To authenticate himself to the AP, he needs to XOR the challenge from

the AP with the computed keystream. It may also be possible for an attacker to obtain S itself. By eavesdropping on several challenge—response pairs between the AP

and various stations, an attacker could launch a dictionary attack and eventually obtain S.

Explanation of the main functions of a firewall : Access Control Address/Port Translation Logging Authentication, Caching

4

4

7

4. a).

b)

Explanation of the practical issues for placement of firewalls

Prevention Detection

6

3

Page 10: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Intrusion prevention anticipates various kinds of attacks and takes steps to forestall their occurrence.On the one hand, programmers should adopt practices that help reduce or eliminate software vulnerabilities.The use of safe string manipulation functions in C/C++ and the use of parameterized SQL queries are some of the practices recommended to protect againstbuffer overflow and SQL injection attacks, respectively.Likewise, sanitizing user input from HTML forms is one preventive measure against cross-site scripting attacks. Another set of preventive measures may be taken by thecomputing system (hardware, compiler, or operating system) to provide a second lineof defence.Extensive training should be imparted to system administrators on this and related tasks.Finally, users should be trained to adhere to sound security practices such as password protection and be educated on the variety ofsocial engineering attacks.One final aspect of intrusion prevention is deterrence. Hacking, whether for fun or profit, is a criminal offence.

An intrusion detection system (IDS) (Fig.22.1) performs the following three tasks:First, it monitors "events of interest"occurring in the target system or in thenetwork.An event of interest may be a system call (acall made to the operating system) to, forexample, open a file containing sensitivedata.Another event of interest may be theattempted establishment of a TCPconnection from a specific IP address to acertain port. 2.An IDS generates a large amount of data which it then analyzes and converts into valuable information to be used by system administrators.These are examples of thresholds and parameters set by a human.On the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events when they occur, and flagging such events.There are a number of key questions related to IDS functioning and deployment:What are the variables that the IDS should monitor?When should an alert be raised? When should an alarm be sounded?Where should the IDS be placed?

7

Page 11: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Department of Information Science and EngineeringIII Internal Assessment Test

Subject : Database Management System Year : 2018Sub Code : 15CS53 Semester : V

Date : 24/11/2018Duration : 1Hr. 10Min. Max Marks: 30 Note :- Solve any ONE full Question from each PART

Q.No PART A Marks CO RBL1. a).

b)

Explain the equivalence set for functional dependencies with suitable example.Write the algorithm to check lossless join dependency for the decomposition relation into set of relations. Explain with suitableexample.

7 8

4

4

2 5

2. a).

b)

What is transaction? Explain the transaction with state transition diagram.Describe the desirable properties of transactions.

8 7

5 5

3

4PART B

3. a).b)

Explain the concurrency control based on timestamp ordering.Define granularity. Describe the roles followed by multiple granularitylevel key with lock compatibility matrix.

7 8

5 5

5 5

4. a).b)

Explain the shadow paging with neat diagram.What is recoverability? Explain the how ARIES algorithm works to support recoverability.

7 8

5 5

2 3

Page 12: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Department of Information Science and EngineeringIII Internal Assessment Test

Subject : Data Warehousing and Data Mining Year : 2018Sub Code :10IS74 Semester and Div.: VII

Date : 23/11/2018Duration : 1 Hr. Max Marks: 25 Note:- Solve Any TWO full Questions

Q.No Marks CO RBL1. a).

b)Write the nearest neighbour algorithm. Explain the characteristics of it.Describe how the rule based classifier works.

6.5 6

4 4

3 2

2. a).b)

Discuss the different features of cluster analysis.Explain how clustering takes place with the help of computing distances.

6.5 6

3 3

2 4

3. a).

b)

Describe the agglomerative method of hierarchical cluster with suitable example. Explain the divisive cluster method with example .

7 5.5

5 5

2 2

Department of Information Science and EngineeringIII Internal Assessment Test

Subject : Data Warehousing and Data Mining Year : 2018Sub Code :10IS74 Semester and Div.: VII

Date : 23/11/2018Duration : 1 Hr. Max Marks: 25

Page 13: sumangalabiradar.files.wordpress.com · Web viewOn the other hand, it would be highly desirable if the IDS were capable of learning what is normal behaviour, detecting anomalous events

B.L.D.E.A’sV.P.Dr.P.G.HALAKATTI COLLEGE OF ENGINEERING & TECHNOLOGY, BIJAPUR

Note:- Solve Any TWO full Questions Q.No Marks CO RBL1. a).

b)Write the nearest neighbour algorithm. Explain the characteristics of it.Describe how the rule based classifier works.

6.5 6

4 4

3 2

2. a).b)

Discuss the different features of cluster analysis.Explain how clustering takes place with the help of computing distances.

6.5 6

3 3

2 4

3. a).

b)

Describe the agglomerative method of hierarchical cluster with suitable example. Explain the divisive cluster method with example .

7 5.5

5 5

2 2