1(a)
Explain software flaws with examples.
5 M
1(b)
List with examples the different mechanisms to achieve security.
5 M
1(c)
Explain with examples,keyed and keyless transposition chipers.
5 M
1(d)
Elaborate the steps of key generation using RSA algorithm.
5 M
2(a)
A and B decide to use Diffie Hellman algorithm to share a key. They chose p=23 and g=5 as the public parameters. Their secret keys are 6 and 15 respectively. Compute the secret key that they share.
10 M
2(b)
Explain working of DES.
10 M
3(a)
What is access control? How does the Bell La Padula model achieve access control.
10 M
3(b)
What is a digital signature. Explain any digital signature algorithm in detail.
10 M
4(a)
Compare packet sniffing and packet spoofing. Explain session hijacking attack.
10 M
4(b)
Explain working of Kerberos.
10 M
5(a)
What is firewall? What are the firewall design principle?
5 M
5(b)
What are the various ways for memory and address protection?
5 M
5(c)
Explain the significance of an Intrusion Detection System for securing a network. Compare signature based and anomaly based IDS.
10 M
Write in brief about (any four):
6(i)
Email Security
5 M
6(ii)
SSL handshake protocol
5 M
6(iii)
IPSec protocols for security
5 M
6(iv)
Denial of service attacks
5 M
6(v)
IDEA
5 M
More question papers from Cryptography & System Security