1 (a)
Distinguish between substitution cipher and transposition cipher.
5 M
1 (b)
What are different types of malicious codes.
5 M
1 (c)
What are the different types of IP-Spoofing.
5 M
1 (d)
Differentiate between - vulnerability, threats and controls.
5 M
2 (a)
A and B decide to use Diffie-Hellman key exchange where P=13, g=2. Each choose his own secret no. and exchange nos. 6 and 11.
i) What is common secret key?
ii) What are their secret nos?
iii) Can intruder M, gain any knowledge from protocol run if he sees p, g and the 2 public keys 6 & 11. If yes, show how?
i) What is common secret key?
ii) What are their secret nos?
iii) Can intruder M, gain any knowledge from protocol run if he sees p, g and the 2 public keys 6 & 11. If yes, show how?
10 M
2 (b)
Explain structure of DES.
10 M
3 (a)
Describe block ciphers? Explain any one with example.
10 M
3 (b)
Explain difference between MAC and message digest? What is role of compression function in general structure of message digest?
10 M
4 (a)
What is Reverse Engineering? Explain need of Digital Rights Management.
10 M
4 (b)
What is Buffer overflow and incomplete mediation in Software Security?
10 M
5 (a)
How does ESP header guarantee confidentiality & integrity for packet payload?
10 M
5 (b)
What makes a network vulnerable?
10 M
6 (a)
What are different types of firewalls? Explain design, configuration and limitations.
10 M
6 (b)
IPSec offers security at network layer. What is the need of SSL? Explain the services of SSL protocol?
10 M
Write short notes on (any two):
7 (a)
MDS.
10 M
7 (b)
Covert Chanel.
10 M
7 (c)
CAPCHA.
10 M
7 (d)
Trojan.
10 M
More question papers from Cryptography & System Security