Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

Mumbai University Computers ( Semester – VII )

Solution for Cryptography & System Security


May-2016
Index
Q.1)
a) …………………………………………………………………………. 2 (N.A.)
b) …………………………………………………………………………. 2 - 3
c) …………………………………………………………………………. 3 - 4
d) …………………………………………………………………………. 5 – 6
Q.2)
a) …………………………………………………………………………. 6 (N.A.)
b) …………………………………………………………………………. 7 to 13
Q.3)
a) …………………………………………………………………………. 13
b) …………………………………………………………………………. 14 - 15
Q.4)
a) …………………………………………………………………………. 15 - 16
b) …………………………………………………………………………. 17 to 19
Q.5)
a) …………………………………………………………………………. 19
b) …………………………………………………………………………. 19 to 25
c) …………………………………………………………………………. 25 to 28
Q.6)
a) …………………………………………………………………………. 28 - 29
b) …………………………………………………………………………. 29 to 32
c) …………………………………………………………………………. 32 - 33
d) …………………………………………………………………………. 34
e) …………………………………………………………………………. 35 to 37

1 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.1) Attempt All (20)


a) Explain software flaws with examples.

Ans :- N.A.

b) List with examples the different mechanism to achieve security.

Ans :- Security Mechanisms

2 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

c) Explain with examples, keyed and keyless transposition ciphers.

Ans :-

3 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

4 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

d) Elaborate the steps of key generation using RSA algorithm. (05)


Ans :- RSA Algorithm

5 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.2)
a) A and B decide to use Diffie-Hellman algorithm to share a key. They chose p=23 and
g=5 as the public parameters. Their secret key that they share. (10)

Ans :- N.A.

6 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) Explain working of DES. (10)


Ans :- Data Encryption Standard

7 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Detail steps in DES :-

Initial Permutation (IP) :-

8 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Rounds :-

9 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

10 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Final Permutation :-

11 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Advantage of DES :-

Disadvantage in DES :-

Double Des :-

Triple DES :-

12 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.3)
a) What is access control? How does the Bell La padula module achieve access control.(10)

Ans :- The Bell-LA Padula Model (BLP)

13 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

B) What is Digital signature. Explain any digital signature algorithm in


detail.(10)
Ans :- Digital Signature

14 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.4)
a) Compare packet sniffing and packet spoofing. Explain session hijacking attack (10)

Ans :- Session Hijacking and Spoofing

15 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

16 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) Explain working of Kerberos. (10)


Ans :- Kerberos 5.0

17 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

18 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.5)
a) What is Firewall? What are the Firewall design principles? (05)
Ans :- Firewall

Design of Firewall :-

b) What are the various ways for memory and address protection.(05)

Ans :- Operating System Security

19 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

20 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

21 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

22 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

23 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

24 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

C) Explain the significance of an Intrusion Detection System for securing a network.


Compare signature based and anomaly based IDS. (10)
Ans :-

25 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

26 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

27 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.6) Write short note on (Any Four) (20)

a) Email Security
Ans :-

28 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) SSL handshake protocol

Ans :- Working Of SSL

29 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

30 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

31 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

c) IPSec protocols for security.

Ans :- Security protocols :-

32 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

33 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

34 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

d) Denial of service attacks.


Ans :-

e) IDEA

Ans :-

35 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

36 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

37 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

38 |www.brainheaters.in

You might also like