Marks: 4×5=20
1. Define Security Service,Security Attack and Security mechanism.Discuss different Security Services and Attacks.
2. What is Buffer overflow attack? Explain with a suitable example.
3. Explain Session hijacking and present TCP session hijacking.
4. Draw and explain a model for Network Security.
5. What is Conventional Encryption? Explain Feistel Cipher structure with a neat diagram.
6. What is Symmetric key encryption? Explain DES in detail.
7. Explain in detail the principles of Algorithm IDEA and describe the operations performed in single round of IDEA.
8. Explain the Key distribution process in detail.
9. Write the public key encryption principles.Explain RSA algorithm with
example.
10. How the communicating parties agree on the keys? Explain the relevant algorithm which is used for key agreement.
11. Explain the following Cipher block modes of operation.
a) CBC b)ECB c) CFB
12. Write in detail the Message authentication and explain MAC and HMAC.
13. Explain SHA-1 algorithm in detail.
14. What is Digital signature and explain how the communicating party get digitally signed.

5:30 AM
VAAGESWARI COLLEGES