Professional Documents
Culture Documents
CSS Sem6 CBCS Computer Engg May19
CSS Sem6 CBCS Computer Engg May19
Q. 6
E2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098 F63 3A6 EE2 2AD A0 0FE5
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A
68093
2A A F 58 2 6B C0 2 77 09 F 3A E 2A A 0F 58 2
D 0F E5 A D6 C C D7 70 8 63 6E E2 D 0 E5 A D6
DAA0F E58 8A2 2D6 BC0 0C2 2D7 770 98F F63AA6E E2AADAA0F FE5 8A2 2D6 BC
E D B D 7 9 6 E E 8 D B 0
A0 0FE 58AA2D 6BC C0C C2D 777 7098 8F6 3A6 6EE 2ADDA0 0FE 58AA2D 6B C0C C2D
detail.
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
e. IDS
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
c. 3DES
d. X.509
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA
a. Kerberos
launch an attack.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
b. Buffer Overflow
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Qp
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
N. B: 1. Question No. 1 is Compulsory.
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
------x-----
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Q.1 a) Enlist security goals. Discuss their significance.
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
what is B’s public key R2? What is the shared secret key?
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
0C2D777098F63A6EE2ADA0FE58A2D6BC
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA
.co
message signing and verification using RSA digital signature.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58 m
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
and SHA Hash functions. State real world applications of hash functions.
d) List various Software Vulnerabilities. How vulnerabilities are exploited to
Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221).
Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in
Paper / Subject Code: 88904 / Cryptography and System Security
Calculate their private keys. A wishes to send message m=5 to B. Show the
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
b) What are traditional ciphers? Discuss any one substitution and transposition
private key x=5, what is A’s Public Key R1? If user B has private key y=12,
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key
b) What are the requirements of the cryptographic hash functions? Compare MD5
c) What is authentication header(AH)? How does it protect against replay attacks?
prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6E
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2
(05)
(05)
(05)
(05)
(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A
Page 1 of 1
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2
[Total Marks 80]
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0
A2 6 C C2 7 70 8F 3A 6E 2 D 0F
D6 BC 0C D7 770 98 63 6E E2 AD A0
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE
0C 2D 777 098 F63 A6 EE AD A0 FE
7 0 E 2 5