CSS
CSS
FF
X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security
47
FF
X2
B4
37
7Y
B4
47
FF
X
X2
23
47
FF
7Y
B4
FF
FX
7Y
B4
3
47
X2
B4
23
47
7Y
4
47
X
B
7Y
F
23
47
FF
Duration: 3Hours [Max Marks : 80]
7Y
23
X
B
B4
23
47
FF
FX
7
Y
23
47
37
FX
B4
4F
X
7
7Y
X2
N.B : (1) Question No 1 is Compulsory.
4F
23
47
FF
7B
3
FF
(2) Attempt any three questions out of the remaining five.
FX
7B
2
4
Y4
X
7B
7
B4
Y4
(3) All questions carry equal marks.
4F
FF
37
2
Y4
47
X
7B
37
(4) Assume suitable data, if required and state it clearly.
X2
4
FF
B
7
7Y
4
X2
47
FF
7B
Y
X2
4
23
FF
B
37
7Y
B4
Y4
47
FF
FX
1 Attempt any FOUR [20]
X2
B4
23
47
37
7Y
B4
4F
47
FF
FX
X2
a Explain Euclidean Algorithm.
23
47
7B
37
7Y
B4
4F
FF
X
Y4
23
FF
FX
B
37
2
B4
7
FX
37
FX
7Y
2
4
Y4
47
FX
7B
X2
B4
4F
4F
37
7Y
2
Y4
47
FF
7B
FX
7B
X2
4
23
7B
37
7Y
B4
Y4
Y4
FF
FX
X2
B4
23
47
37
37
B4
4F
7
X
37
7Y
X2
X2
Y4
2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47
7B
X2
B4
4F
FF
FF
7Y
attacks on it. Consider the example where A and B decide to use the Diffie
X2
Y4
3
FF
7B
B4
X2
B4
Y4
23
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
FF
37
B4
Y4
47
47
FF
FX
7
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
X2
B4
3
47
37
7Y
7Y
X2
4
4F
FF
B
X2
23
23
47
7B
7
FF
FX
7
FX
7Y
Y4
23
47
FX
B
B4
3 a Explain cryptographic hash functions with properties of secure hash function. [10]
4F
4F
23
47
FX
37
7Y
F
47
7B
X
7B
X2
4
4F
23
FF
7B
37
7Y
Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4
FF
FX
7B
2
B4
Y4
23
37
X
B4
Y4
4F
FF
FX
7
X2
23
47
7B
37
Y
4F
b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF
[10]
X
7B
37
7Y
X2
Y4
FF
7B
Y4
23
FF
37
X
B4
Y4
47
5 a What are the different components of IDS? List and explain different approaches
FF
FX
[10]
37
X2
B4
47
37
7Y
X2
of IDS.
4F
47
FF
7Y
X2
23
FF
[10]
7Y
B4
23
FF
FX
B4
Y4
23
47
FX
4F
47
FX
37
7Y
4F
1. Packet Sniffing.
47
7B
Y
X2
4F
23
7B
37
7Y
2. ARP spoofing.
Y4
FF
FX
7B
Y4
[10]
37
B4
Y4
4F
FX
37
X2
47
B
37
2
4F
47
FF
FX
7Y
X2
7B
7Y
B4
_____________
4F
23
FF
Y4
23
47
FX
7B
B4
FX
37
7Y
4F
47
X2
4F
23
7B
7Y
FF
FX
7B
Y4
3
X2
B4
Y4
4F
37
55415 Page 1 of 1
47
FF
7B
37
2
FX
7Y
X2
B4
Y4
23
47
FF
37
FX
7Y
X2
B4
X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF
D8
C
98
9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security
24
C3
87
C5
B8
D8
18
98
9F
D5
24
20
C3
87
C5
B8
D8
9E
18
98
D5
4
34
C3
7
2
2
88
B8
8
98
3D
Duration: 3hrs [Max Marks: 80]
01
79
AB
24
3 4
E2
C
88
D8
8
8
53
B
9
49
01
9
B
4
N.B. : (1) Question No 1 is Compulsory.
C3
87
9F
2
3
2
A
8
98
9E
18
C5
98
3
(2) Attempt any three questions out of the remaining five.
3D
5
87
9F
D5
(3) All questions carry equal marks.
83
2
A
C
E
8
5
8
53
B8
B9
49
01
C
9
(4) Assume suitable data, if required and state it clearly.
87
9F
5
83
2
24
A
D
18
5
3
B8
9
D8
9
C
9
5
AB
20
87
F
5
3
4
C3
9
D
1 Attempt any FOUR [20]
98
9E
2
18
C5
53
8
D8
98
AB
20
F
a Explain the relationship between Security Services and Mechanisms in detail.
3
24
3
87
59
D
9E
C
53
8
9
8
b Explain ECB and CBC modes of block cipher.
18
C
8
AB
3D
34
F
9
5
4
20
9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.
98
2
C
8
3
B8
8
9E
49
18
5
98
AB
3D
d Explain challenge response-based authentication tokens.
9F
5
83
4
34
87
8D
82
E2
C5
53
Explain buffer overflow attack.
B9
e
8
B
D
B9
49
01
9F
79
5
24
3A
3
D
3
2
3A
8C
88
C5
B8
D8
8
F5
B9
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9
[10]
01
79
F5
D5
24
4
59
3
public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A
C
88
59
8
8
8
9E
5C
8
B
3D
9
01
5C
9
F5
AB
What is the cipher text for M=10 using the public key.
4
4
8D
82
3
E2
8C
88
59
8D
8
3
4B
3D
9
49
1
5C
9
5
AB
87
F
82
3
E2
8C
9
8D
8
82
18
5
3D
B9
9
5C
79
5
4B
3D
20
F
8C
88
9
8D
9E
82
8C
C5
53
3.Role of S-box
9
01
79
4B
AB
3D
34
F
79
D5
88
9
98
82
8C
88
C5
3
B8
01
F5
34
01
79
D5
E2
24
3A
59
8
2
8C
88
B9
8
9E
49
5C
F5
B
3D
01
79
3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4
3A
59
8D
2
83
8C
88
B9
8
9E
[10]
5
B
3D
B9
01
F
79
D5
4
4
3A
59
2
83
2
3A
C
88
B8
8
9E
F5
8
3D
9
9
F5
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB
24
4
20
87
59
83
8C
B8
18
5C
53
3D
9
9
AB
24
4
20
8D
83
8C
88
59
8
9E
53
4B
3D
9
1
5C
79
AB
20
F
82
83
5 a [10]
9E
53
B8
3D
9
01
5C
79
φ(11)
AB
34
a.
F
E2
8C
88
59
D
8
53
φ(49)
B8
01
5C
b.
79
AB
4
F
E2
4
88
59
D
φ(240)
8
82
53
c.
B8
B9
01
5C
D
4
F
83
E2
4
A
C3
3
B8
B9
49
5C
5
98
83
4
3A
C3
9
D
82
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8
B9
C
5
8
F
79
D5
4
handshake protocol.
3A
C3
59
82
8
8
18
5C
F5
8
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20
C3
59
D
2
AH and ESP.
8
8
D8
9E
18
5C
8
4B
79
____________________________
20
8D
2
8C
8
D8
E
18
4B
49
9
20
3
87
82
3
8C
98
18
3D
49
9
AB
28998 Page 1 of 1
20
87
3
8C
98
18
53
49
79
AB
20
83
88
E
53
B9
53AB98349E20188798C3D824B8D5C59F
49
01