Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

98 6 A6 E A A E 8A D B

98 F63 3A6 EE2 2ADDA0 0FE5 58A 2D 6BC C0C


F A E A A F 8 2 6B 0 2
F6 63A6 6EE E2A DA 0FE E58AA2DD6B C0 C2DD77
3 D 0 C 7
63 A6E EE2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098
A6 E AD A FE 8A 2D B 0C 2D 77 09 F6
3A E 2A A 0F 58 2 6B C0 2 77 0 8F 3A
6E E2 D 0 E5 A D6 C C D7 7 98 63 6
6E E2AADAA0F FE5 8A2 2D6 BC 0C2 2D7 770 098F F63AA6E EE2
8 B 0 7 A
EE E2A DA 0FE E58 A2DD6B C0 C2DD77 709 98F6 63A 6EE E2A DA
D 0 A C 7 8 6 D

Q. 6
E2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098 F63 3A6 EE2 2AD A0 0FE5
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A

68093
2A A F 58 2 6B C0 2 77 09 F 3A E 2A A 0F 58 2
D 0F E5 A D6 C C D7 70 8 63 6E E2 D 0 E5 A D6
DAA0F E58 8A2 2D6 BC0 0C2 2D7 770 98F F63AA6E E2AADAA0F FE5 8A2 2D6 BC
E D B D 7 9 6 E E 8 D B 0
A0 0FE 58AA2D 6BC C0C C2D 777 7098 8F6 3A6 6EE 2ADDA0 0FE 58AA2D 6B C0C C2D

detail.
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63

e. IDS
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE

c. 3DES
d. X.509
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA

a. Kerberos
launch an attack.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC

b. Buffer Overflow
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Qp
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
N. B: 1. Question No. 1 is Compulsory.

A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F

Write short notes on any FOUR:


D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
ke
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
[3 Hours]

77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA


70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
nd
2. Solve any THREE from Question No. 2 to 6.

6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6

------x-----
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Q.1 a) Enlist security goals. Discuss their significance.

pair (3, 7). Decrypt to get back original plaintext.

A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D

b) Discuss in detail block cipher modes of operation.


FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
ra
cipher with example. List their merits and demerits.
b) Explain different types of Denial of Service attacks.

58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709


A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
3. Draw neat well labeled diagram wherever necessary.

D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
what is B’s public key R2? What is the shared secret key?
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A

0C2D777098F63A6EE2ADA0FE58A2D6BC
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA
.co
message signing and verification using RSA digital signature.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58 m
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77

and SHA Hash functions. State real world applications of hash functions.
d) List various Software Vulnerabilities. How vulnerabilities are exploited to

Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221).

58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709

Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in
Paper / Subject Code: 88904 / Cryptography and System Security

Calculate their private keys. A wishes to send message m=5 to B. Show the

A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
b) What are traditional ciphers? Discuss any one substitution and transposition
private key x=5, what is A’s Public Key R1? If user B has private key y=12,

D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key

BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A


Q.3 a) Users A and B use the Diffie-Hellman key exchange technique with a common

b) What are the requirements of the cryptographic hash functions? Compare MD5
c) What is authentication header(AH)? How does it protect against replay attacks?

prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has

0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6


b) Compare AES and DES. Which one is bit oriented? Which one is byte oriented?

2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6E
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2
(05)
(05)
(05)
(05)

(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)

3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A

Page 1 of 1
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2
[Total Marks 80]

E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0
A2 6 C C2 7 70 8F 3A 6E 2 D 0F
D6 BC 0C D7 770 98 63 6E E2 AD A0
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE
0C 2D 777 098 F63 A6 EE AD A0 FE
7 0 E 2 5

You might also like