MU Computer Engineering (Semester 7)
Cryptography & System Security
May 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Explain software flaws with examples.
5 M
1(b) List with examples the different mechanisms to achieve security.
5 M
1(c) Explain with examples,keyed and keyless transposition chipers.
5 M
1(d) Elaborate the steps of key generation using RSA algorithm.
5 M

2(a) A and B decide to use Diffie Hellman algorithm to share a key. They chose p=23 and g=5 as the public parameters. Their secret keys are 6 and 15 respectively. Compute the secret key that they share.
10 M
2(b) Explain working of DES.
10 M

3(a) What is access control? How does the Bell La Padula model achieve access control.
10 M
3(b) What is a digital signature. Explain any digital signature algorithm in detail.
10 M

4(a) Compare packet sniffing and packet spoofing. Explain session hijacking attack.
10 M
4(b) Explain working of Kerberos.
10 M

5(a) What is firewall? What are the firewall design principle?
5 M
5(b) What are the various ways for memory and address protection?
5 M
5(c) Explain the significance of an Intrusion Detection System for securing a network. Compare signature based and anomaly based IDS.
10 M

Write in brief about (any four):
6(i) Email Security
5 M
6(ii) SSL handshake protocol
5 M
6(iii) IPSec protocols for security
5 M
6(iv) Denial of service attacks
5 M
6(v) IDEA
5 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS