0% found this document useful (0 votes)
184 views

Information and Cyber Security

The document contains 6 questions related to information and cyber security. It begins with instructions for candidates regarding which questions to attempt. The questions cover topics like [1] operational security models and classification of information security attacks, [2] security policies and differences between security and privacy, [3] using the Playfair cipher to encrypt a message and explaining algorithm modes like ECB and OFB, [4] explaining the DES algorithm and monoalphabetic and polyalphabetic ciphers, [5] key exchange and explaining Kerberos, and [6] applying the RSA encryption process to generate keys from prime numbers and explaining the need and implementation of MD5 one-way hash functions.

Uploaded by

Sopan Talekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views

Information and Cyber Security

The document contains 6 questions related to information and cyber security. It begins with instructions for candidates regarding which questions to attempt. The questions cover topics like [1] operational security models and classification of information security attacks, [2] security policies and differences between security and privacy, [3] using the Playfair cipher to encrypt a message and explaining algorithm modes like ECB and OFB, [4] explaining the DES algorithm and monoalphabetic and polyalphabetic ciphers, [5] key exchange and explaining Kerberos, and [6] applying the RSA encryption process to generate keys from prime numbers and explaining the need and implementation of MD5 one-way hash functions.

Uploaded by

Sopan Talekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 6] SEAT No.

:
P613

tic
[Total No. of Pages : 2

sta
BE/Insem/APR - 246

:05
B.E. (Computer Engineering)

:39
01
INFORMATION AND CYBER SECURITY

13
85
(2015 Pattern) (Semester - II)

19
01
Time : 1 Hour] /20 [Max. Marks : 30
/03
N

Instructions to the candidates :


39 EG

12

1) Solve Q1 or Q2, Q3 or Q4, Q5 or Q6.


.98

2) Neat diagrams must be drawn wherever necessary.


C
.47

tic
3) Figures to the right indicate full marks.

sta
4) Assume suitable data, if necessary.
7.2

:05
11

:39
01
Q1) a) Explain Operational Security Model for Network Security.
13 [5]
85

b) How Information Security attacks are classified? Give example for each.
19

[5]
01
/20
/03
GN

OR
12

Q2) a) What are different security policies? Explain. [5]


CE
.98

b) List the differences between Security & Privacy. [5]


.47

tic
sta
39
7.2

:05

Q3) a) Use PlayFair Cipher to encrypt the message “This is a columnar


transposition”. Use key - APPLE. [5]
11

:39
3/2 50
1
13

b) Explain following algorithm modes [5]


9
8

i) ECB
01
01

ii) OFB
GN

OR
1 2/0

Q4) a) Explain the operation of DES algorithm in detail. [5]


CE
.98

b) Explain Monoalphabetic & Polyalphabetic ciphers with appropriate


.47

examples. [5]
39
7.2
11

P.T.O.
Q5) a) Find the key exchanged between Alok and Bobby considering following
data.

tic
i) n = 11

sta
ii) g=5

:05
iii) X = 2, Y = 3

:39
01
Find value of A, B and secret key K. [5]

13
85
19
b) What is Kerberos? Explain operation in detail. [5]
01
/20 OR
/03
N
39 EG

12

Q6) a) Given two Prime Numbers P = 17 & Q = 29 find out N, E, & D in an


RSA encryption process. [5]
.98
C
.47

tic
b) Explain in details the need & implementation of one way hash function

sta
(MD5). [5]
7.2

:05
11

:39
01
ïïï
13
85
19
01
/20
/03
GN
12
CE
.98
.47

tic
sta
39
7.2

:05
11

:39
3/2 50
1
9 13
8
01
01
GN
1 2/0
CE
.98
.47
39
7.2
11

BE/Insem/APR - 246 2

You might also like