X

MCSCB104 Cryptographic Protocols & Standards M.Tech Model Question Paper : mgu.ac.in

Name of the College : Mahatma Gandhi University
Department : Computer Science and Engineering
Subject Code/Name : MCSCB 104/Cryptographic Protocols and Standards
Sem : I
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper :
I : https://www.pdfquestion.in/uploads/mgu.ac.in/5032-1-MCSCB%20104%20CPS%20-%20I.doc
II : https://www.pdfquestion.in/uploads/mgu.ac.in/5032-2-MCSCB%20104%20CPS%20-%20II.doc

Cryptographic Protocols & Standards Question :

M.Tech Degree Examination :
Branch: Computer Science and Engineering
Specialization : Cyber Security

Related : MGU MCSCB103 Operating System & Security M.Tech Model Question Paper : www.pdfquestion.in/5031.html

Model Question Paper – II
First Semester
MCSCB 104
Cryptographic Protocols and Standards :
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Discuss various methods of formal verification of cryptographic standards (15)
b) In the aspects of security write a short note on complexity theretic proofs. (10)
OR
2. a) Explain about goals for authentication and key establishment. (15)
b) Write short note on goal concerning compromised keys (10)

3. Define the following
a. Server-less key establishments. (10)
b. Entity authentication protocols (10)
c. Multiple serer key establishments (5)
OR
4. a) Write note on Server – based key establishments (15)
b) Briefly explain Woo-Lam authentication protocol. (10)

5. a) Write note on Diffie-Hellman Key Agreement (8)
b) Explain ID based Okamoto’s and Gunther’s encryption schemes (8)
c) Discuss about different MTI protocols (9)
OR
6. a) Describe Entity authentication protocol (10)
b) Explain Key transport protocol (15)

7. Discuss the following key agreement protocols.
a. Steiner – Tusdik- waidner key agreement (9)
b. Perrig’s Generalised Diffie-Hellman (8)
c. Burmester-Desmedt Key Agreement (8)
OR
8. a) Explain conference key agreement protocol (13)
b) Write short note on Identity-Based Conference Key Protocols (12)

M.Tech DEGREE EXAMINATION :
MCSCB 104
Cryptographic Protocols and Standards :
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions.
Time: 3hrs
Maximum: 100 marks
1. a) Explain about Basic goals and Enhanced goals. (15)
b) Write short note on goal concerning compromised keys (10)
OR
2. a) Discuss various methods of formal verification of cryptographic standards (15)
b) Write short note on theoretic model of security. (10)

3. a) Compare the operations of Server-less key establishments and Multiple server key establishments. (15)
b) Discuss Entity authentication protocols with suitable examples (10)
OR
4. a) Write about Server – based key establishments (15)
b) Explain Woo-Lam authentication protocol. (10)

5. a) Explain Entity authentication protocol (10)
b) Explain Key transport protocol (15)
OR
6. a) Write note on Diffie-Hellman Key Agreement (8)
b) Explain ID based Okamoto’s and Gunther’s encryption schemes (8)
c) Discuss about different MTI protocols (9)

7. Discuss the following key agreement protocols with its operation procedures.
a. Steiner – Tusdik- waidner key agreement (9)
b. Perrig’s Generalised Diffie-Hellman (8)
c. Burmester-Desmedt Key Agreement (8)
OR
8. a) Explain conference key agreement protocol (13)
b) Write short note on Identity-Based Conference Key Protocols (12)

Syllabus :
Module 1 : Goals for authentication and Key Establishment
Basic Goals, Enhanced Goals, Goals concerning compromised Keys, Formal Verification of Protocols, Complexity Theoretic Proofs of Security.

Module 2 :
Protocols Using Shared Key Cryptography : Entity Authentication Protocols, Server-Less Key Establishment, Server-Based Key Establishment, Key Establishment Using Multiple Servers, Zero Knowledge interactive proofs.

Module 3 :
Authentication and Key Transport Using Public Key Cryptography : Design Principles for Public Key Protocols, Entity Authentication Protocol, Key Transport Protocols. Key Agreement Protocols: Key Control, Unknown Key-Share Attacks, Classes of Key Agreement: Diffie-Hellman Key Agreement, MTI Protocols, Diffie-Hellman-Based Protocols with Basic Message Format and with Enhanced Message Format.

ID based encryption schemes : Boneh and Franklin’s Scheme, Shamir’s encryption and signature schemes, Okamoto’s scheme, Gunther’s scheme, Girault’s scheme Protocols not Based on Diffie Hellman: SKEME protocol Secret Sharing: Threshold Secret Sharing Schemes, secret sharing based on access structures.

Module 4 :
Conference Key Protocols : Generalizing Diffie-Hellman Key Agreement, Conference Key Agreement Protocols, Identity-Based Conference Key Protocols, Conference Key Agreement without Diffie-Hellman, Conference Key Transport Protocols, Key Broadcasting Protocols

References :
1. Collin Boyd and Anish Mathuria, “Protocols for Authentication and Key Establishment”, Springer; 2010.
2. Abhijith Das and C.E. Veni Madha van, “Public-key Cryptography, Theory and Practice”, Pearson Education, 2009.
3. Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.

Tags: mgu.ac.in
Anusha:
www.pdfquestion.in © 2022 Contact Us   Privacy Policy   Site Map