LJ Polytechnic, Ahmedabad
CE-IT-AIML-CC-GA [Semester-5]
Network Security & Management
Assignment-1 (Unit 1, 2) Tentative
Submission Date
Q# Question
1 Explain CIA Triad in detail with diagrams.
2 Explain various types of Security Attacks in detail with diagrams.
3 Explain Symmetric Cipher Model in detail with diagram.
Perform Encryption and Decryption on the following using the Shift Cipher Substitution
4
Technique: Plain Text = "Your Name", Key = "12".
Perform Encryption and Decryption using the Playfair Cipher Substitution Technique where 7/8/2025
5
Plain Text should be a word with repeated plain text letters in the same pair and Key = "Text"
Perform Encryption and Decryption on the following using the Vigenere Cipher Substitution
6
Technique: Plain Text = "AUTOSUM", Key = "FIND"
Explain Hill Cipher Substitution Technique with example (Length of Plain Text and Key Matrix
7
should be 3x3).
Assignment-2 (Unit 3, 4, 5) Tentative
Submission Date
Q# Question
1 Define Firewall. Explain any two types of Firewalls in detail.
2 Explain Tunnel Mode and Transport Mode of IPSec in detail.
3 Write down the difference between IPv4 and IPv6. 11/9/2025
4 Explain X.500 Directory Architecture in detail.
5 Explain DORA process of DHCP in detail. (without using relay agent and with using relay agent).