MU Computer Engineering (Semester 7)
Cryptography & System Security
May 2016
Total marks: --
Total time:
INSTRUCTIONS
(a) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary
2& LOGIN TO DOWNLOAD PDF @) GET ANSWERS
(a) Explain software flaws with examples. 5M
1(b) List with examples the different mechanisms to achieve 5M
security.
1(c) Explain with examples,keyed and keyless transposition 5M
chipers.
1(d) Elaborate the steps of key generation using RSA algorithm. 5M
2(a) Aand B decide to use Diffie Hellman algorithm to share a 10M
key. They chose p=23 and g=5 as the public parameters. Their
secret keys are 6 and 15 respectively. Compute the secret key
that they share.
2(b) Explain working of DES. 10M
3(a) What is access control? How does the Bell La Padula model 10M
achieve access control.
3(b) What is a digital signature. Explain any digital signature 10M
algorithm in detail.
4(a) Compare packet sniffing and packet spoofing. Explain 10M
session hijacking attack.
4(b) Explain working of Kerberos. 10M
5(a) What is firewall? What are the firewall design principle? 5M
5(b) What are the various ways for memory and address 5M
protection?
5(c) Explain the significance of an Intrusion Detection System 10M
for securing a network. Compare signature based and anomaly
based IDS.
Write in brief about (any four):
6(i) Email Security 5M
6(ii) SSL handshake protocol 5M
6(iii) IPSec protocols for security 5M
6(iv) Denial of service attacks 5M
6(v) IDEA 5M