MU Computer Engineering (Semester 7)
Cryptography & System Security
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) Define the following examples
i) Substitution cipher
ii) Poly-alphabetic cipher
iii) Salami attack
iv) Session Hijacking
10 M
1 (b) With the help of examples explain non-malicious programming errors.
5 M
1 (c) Define the goals of security and specify mechanisms to archive each goal.
5 M

2 (a) In an RSA system the public key (e,n) of user A is defined as (7,119). Calculate Φn and private key d. what is the cipher text when you encrypt message m=10, using the public key?
10 M
2 (b) Give the format of X 509 digital certificate and explain the use of a digital signature in it.
5 M
2 (c) Encrypt "The key is hidden under the door" using playfair cipher with keyword "domestic".
5 M

3 (a) Explain how a key is shared between two parties using Diffie-Hellman by exchange algorithm. What is the drawback of this algorithm?
10 M
3 (b) Differentiate between i) MD-5 and SHA ii) Firewall and IDS.
10 M

4 (a) Explain working of DES detailing the Fiestel structure.
10 M
4 (b) What is a Denial of service attack. What are the different ways in which an attacker can mount a DOS attack on a sytem?
10 M

5 (a) List the functions of the different protocols of SSL. Explain the handshake protocol.
5 M
5 (b) How does PGP achieve confidentially and authentication in emails?
5 M
5 (c) Differentiate between the transport mode and tunnel mode of IP Sec and explain how authentication and confidentiality are achieved using IP Sec.
10 M

Write in brief about (any four):
6 (a) Operating System Security.
5 M
6 (b) Buffer overflow attack.
5 M
6 (c) IP spoofing
5 M
6 (d) Viruses and their types.
5 M
6 (e) Key generation in IDEA.
5 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS