MU Computer Engineering (Semester 7)
Cryptography & System Security
May 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Distinguish between substitution cipher and transposition cipher.
5 M
1 (b) What are different types of malicious codes.
5 M
1 (c) What are the different types of IP-Spoofing.
5 M
1 (d) Differentiate between - vulnerability, threats and controls.
5 M

2 (a) A and B decide to use Diffie-Hellman key exchange where P=13, g=2. Each choose his own secret no. and exchange nos. 6 and 11.
i) What is common secret key?
ii) What are their secret nos?
iii) Can intruder M, gain any knowledge from protocol run if he sees p, g and the 2 public keys 6 & 11. If yes, show how?
10 M
2 (b) Explain structure of DES.
10 M

3 (a) Describe block ciphers? Explain any one with example.
10 M
3 (b) Explain difference between MAC and message digest? What is role of compression function in general structure of message digest?
10 M

4 (a) What is Reverse Engineering? Explain need of Digital Rights Management.
10 M
4 (b) What is Buffer overflow and incomplete mediation in Software Security?
10 M

5 (a) How does ESP header guarantee confidentiality & integrity for packet payload?
10 M
5 (b) What makes a network vulnerable?
10 M

6 (a) What are different types of firewalls? Explain design, configuration and limitations.
10 M
6 (b) IPSec offers security at network layer. What is the need of SSL? Explain the services of SSL protocol?
10 M

Write short notes on (any two):
7 (a) MDS.
10 M
7 (b) Covert Chanel.
10 M
7 (c) CAPCHA.
10 M
7 (d) Trojan.
10 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS