Download as pdf
Download as pdf
You are on page 1of 1
MU Computer Engineering (Semester 7) Cryptography & System Security May 2016 Total marks: -- Total time: INSTRUCTIONS (a) Assume appropriate data and state your reasons (2) Marks are given to the right of every question (3) Draw neat diagrams wherever necessary 2& LOGIN TO DOWNLOAD PDF @) GET ANSWERS (a) Explain software flaws with examples. 5M 1(b) List with examples the different mechanisms to achieve 5M security. 1(c) Explain with examples,keyed and keyless transposition 5M chipers. 1(d) Elaborate the steps of key generation using RSA algorithm. 5M 2(a) Aand B decide to use Diffie Hellman algorithm to share a 10M key. They chose p=23 and g=5 as the public parameters. Their secret keys are 6 and 15 respectively. Compute the secret key that they share. 2(b) Explain working of DES. 10M 3(a) What is access control? How does the Bell La Padula model 10M achieve access control. 3(b) What is a digital signature. Explain any digital signature 10M algorithm in detail. 4(a) Compare packet sniffing and packet spoofing. Explain 10M session hijacking attack. 4(b) Explain working of Kerberos. 10M 5(a) What is firewall? What are the firewall design principle? 5M 5(b) What are the various ways for memory and address 5M protection? 5(c) Explain the significance of an Intrusion Detection System 10M for securing a network. Compare signature based and anomaly based IDS. Write in brief about (any four): 6(i) Email Security 5M 6(ii) SSL handshake protocol 5M 6(iii) IPSec protocols for security 5M 6(iv) Denial of service attacks 5M 6(v) IDEA 5M

You might also like