0% found this document useful (0 votes)
7 views8 pages

CSS

The document outlines an examination paper for Cryptography & System Security, detailing the structure, duration, and marking scheme. It includes instructions for answering questions, with specific emphasis on compulsory questions and the requirement to attempt a set number of questions. The paper covers various topics within cryptography, including algorithms, security services, and attacks on digital signatures.

Uploaded by

sunnymaurya187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

CSS

The document outlines an examination paper for Cryptography & System Security, detailing the structure, duration, and marking scheme. It includes instructions for answering questions, with specific emphasis on compulsory questions and the requirement to attempt a set number of questions. The paper covers various topics within cryptography, including algorithms, security services, and attacks on digital signatures.

Uploaded by

sunnymaurya187
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

7

FF

X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security

47

FF
X2
B4
37

7Y

B4
47

FF

X
X2

23

47

FF
7Y

B4
FF

FX

7Y

B4
3

47
X2
B4

23

47
7Y

4
47

X
B

7Y
F

23

47

FF
Duration: 3Hours [Max Marks : 80]

7Y

23
X
B

B4
23

47

FF

FX
7

Y
23

47

37
FX

B4

4F
X
7

7Y

X2
N.B : (1) Question No 1 is Compulsory.

4F

23

47

FF

7B
3

FF
(2) Attempt any three questions out of the remaining five.

FX
7B

2
4

Y4
X
7B
7

B4
Y4
(3) All questions carry equal marks.

4F

FF

37
2

Y4

47
X
7B
37
(4) Assume suitable data, if required and state it clearly.

X2
4
FF

B
7

7Y

4
X2

47

FF

7B
Y

X2
4

23
FF

B
37

7Y

B4

Y4
47

FF

FX
1 Attempt any FOUR [20]
X2
B4

23

47

37
7Y

B4

4F
47

FF

FX

X2
a Explain Euclidean Algorithm.

23

47

7B
37
7Y

B4

4F

FF
X

Y4
23

b Explain RC4 stream cipher.


47

FF

FX
B
37

2
B4
7

FX
37
FX

7Y

2
4

Y4

47
FX
7B

c Differentiate between SHA-1 and MD5

X2
B4

4F
4F

37

7Y
2

Y4

47

FF

7B
FX
7B

d Explain worms and viruses

X2
4

23
7B
37

7Y

B4

Y4
Y4

FF

FX
X2
B4

Discuss RSA as a digital signature algorithm.


Y4

23

47

37
37

B4

4F
7

X
37

7Y

X2
X2

Y4

2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47

7B
X2
B4

4F

FF
FF

7Y

attacks on it. Consider the example where A and B decide to use the Diffie

X2

Y4
3

FF

7B

B4
X2
B4

Y4

23

Hellman algorithm to share a key. They choose p=23 and g=5 as the public

FF

37
B4

Y4

47
47

FF

FX
7

parameters. Their secret keys are 6 and 15 respectively. Compute the secret key

X2
B4
3

47

37

7Y
7Y

X2
4

4F

that they share


47

FF
B

X2

23
23

47

7B
7

b Explain Advanced Encrypted Standards (AES) in detail. [10]


B4
4F

FF

FX
7
FX

7Y

Y4

23

47
FX
B

B4

3 a Explain cryptographic hash functions with properties of secure hash function. [10]

4F
4F

23

47

FX
37

7Y
F

47

7B
X
7B

X2
4

4F

23
FF

7B
37

7Y

Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4

FF

FX
7B
2
B4

Y4

23

37
X

B4

Y4

4F

4 a Explain Public Key Distribution in detail. [10]


47

FF

FX
7

X2
23

47

7B
37
Y

4F

b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF

[10]
X
7B
37

7Y

X2

Y4
FF

7B

the keyword “domestic”.


B4
2

Y4

23

FF

37
X

B4

Y4

47

5 a What are the different components of IDS? List and explain different approaches
FF

FX

[10]
37

X2
B4
47

37

7Y
X2

of IDS.
4F

47

FF
7Y

X2

23
FF

b Explain Needham-schroeder authentication protocol.


7B

[10]
7Y

B4
23

FF

FX
B4

Y4

23

47
FX

6 a Write a short note on [10]


B4

4F
47

FX
37

7Y
4F

1. Packet Sniffing.
47

7B
Y

X2

4F

23
7B
37

7Y

2. ARP spoofing.
Y4
FF

FX
7B
Y4

b Discuss various attacks on Digital signatures.


23

[10]
37
B4

Y4

4F
FX
37

X2
47

B
37
2

4F

47

FF
FX

7Y

X2
7B

7Y

B4

_____________
4F

23

FF
Y4

23

47
FX
7B

B4

FX
37

7Y
4F

47
X2

4F

23
7B

7Y
FF

FX
7B
Y4

3
X2
B4

Y4

4F
37

55415 Page 1 of 1
47

FF

7B
37
2
FX

7Y

X2
B4

Y4
23

47

FF

37
FX

7Y

X2
B4

X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF
D8

C
98

9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security

24
C3
87

C5
B8
D8
18

98

9F
D5
24
20

C3
87

C5
B8
D8
9E

18

98

D5
4
34

C3
7

2
2

88

B8
8
98

3D
Duration: 3hrs [Max Marks: 80]

01

79
AB

24
3 4

E2

C
88

D8
8

8
53

B
9

49

01

9
B

4
N.B. : (1) Question No 1 is Compulsory.

C3
87
9F

2
3

2
A

8
98

9E

18
C5

98
3
(2) Attempt any three questions out of the remaining five.

3D
5

87
9F
D5
(3) All questions carry equal marks.

83

2
A

C
E

8
5

8
53
B8

B9

49

01
C

9
(4) Assume suitable data, if required and state it clearly.

87
9F
5

83

2
24

A
D

18
5

3
B8

9
D8

9
C

9
5

AB

20

87
F
5

3
4
C3

9
D
1 Attempt any FOUR [20]

98

9E
2

18
C5

53
8
D8
98

AB

20
F
a Explain the relationship between Security Services and Mechanisms in detail.

3
24
3
87

59
D

9E
C

53
8

9
8
b Explain ECB and CBC modes of block cipher.
18

C
8

AB
3D

34
F
9

5
4
20

9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.

98
2
C
8

3
B8
8
9E

49
18

5
98

AB
3D
d Explain challenge response-based authentication tokens.

9F
5

83
4
34

87

8D
82
E2

C5

53
Explain buffer overflow attack.

B9
e
8

B
D
B9

49

01

9F
79

5
24

3A
3

D
3

2
3A

8C
88

C5
B8
D8
8

F5
B9

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9

[10]
01

79
F5

D5
24
4

59
3

public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A

C
88
59

8
8
8

9E

5C
8

B
3D
9

01
5C

9
F5

AB

What is the cipher text for M=10 using the public key.

4
4

8D
82
3

E2

8C
88
59
8D

8
3

4B
3D
9

49

1
5C

9
5

b Discuss DES with reference to following points [10]


4B

AB

87
F

82
3

E2

8C
9
8D

8
82

1. Block size and key size

18
5

3D
B9

9
5C

79
5
4B
3D

20
F

2.Need of expansion permutation


3
A

8C
88
9
8D

9E
82
8C

C5

53

3.Role of S-box
9

01

79
4B

AB
3D

34
F
79

D5

4.Weak keys and semi weak keys E2

88
9

98
82
8C
88

C5

3
B8

01
F5

5. Possible attacks on DES


B
3D

34
01

79

D5

E2
24

3A
59

8
2

8C
88

B9
8
9E

49
5C

F5
B
3D
01

79

3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4

3A
59
8D
2
83

8C
88

B9
8
9E

b What is DDOS attack? Explain how is it launched.


C

[10]
5
B
3D
B9

01

F
79

D5
4
4

3A
59
2
83

2
3A

C
88

B8
8
9E

F5
8

3D
9

9
F5

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB

24
4

20

87

59
83

8C

B8

in digital certificates? Explain any one digital signature algorithm.


8
9E

18

5C
53

3D
9

9
AB

24
4

20

b How does PGP achieve confidentiality and authentication in emails? [10]


7
F

8D
83

8C
88
59

8
9E
53

4B
3D
9

1
5C

79
AB

20
F

82
83

State the rules for finding Euler’s phi function. Calculate


8C
88
59
D

5 a [10]
9E
53
B8

3D
9

01
5C

79

φ(11)
AB

34

a.
F

E2

8C
88
59
D

8
53

φ(49)
B8

01
5C

b.
79
AB

4
F

E2
4

88
59
D

φ(240)
8
82

53

c.
B8

B9

01
5C
D

4
F

83

E2
4

A
C3

b Explain Kerberos. Why is it called as SSO? [10]


59
D
82

3
B8

B9

49
5C

5
98

83
4

3A
C3

9
D
82

6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8

B9
C

5
8

F
79

D5
4

handshake protocol.
3A
C3

59
82
8

8
18

5C

F5
8

b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20

C3

59
D
2

AH and ESP.
8

8
D8
9E

18

5C
8

4B
79

____________________________
20

8D
2
8C
8

D8
E

18

4B
49

9
20

3
87

82
3

8C
98

18

3D
49

9
AB

28998 Page 1 of 1
20

87
3

8C
98

18
53

49

79
AB

20
83

88
E
53

B9

53AB98349E20188798C3D824B8D5C59F
49

01

You might also like