MU Computer Engineering (Semester 7)
Cryptography & System Security
May 2013
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Explain Different Birthday problems.
5 M
1(b) What are the key principles of security?
5 M
1(c) Compare and contrast SHA-1 and MD5.
5 M
1(d) Explain Honey Pots.
5 M

2(a) How flaw in TCP/IP can cause operating system to become vulnerable? Also explain how Kerberos are used for user authentication in windows?
10 M
2(b) For the given values p=19,q=23 and e=3, find ? (n) and d using RSA algorithm.
10 M

3(a) What is Buffer overflow and incomplete mediation in software security?
10 M
3(b) Explain one time initialization process and processes in each round of advanced encryption standard.
10 M

4(a) What is denial of service attack? What are the ways in which a user can mount dos attack on the system?
10 M
4(b) Compare Packet Sniffing and Packet Spoofing. Explain session hijacking attack.
10 M

5(a) Explain Multi Level Security Model. Also explain multi lateral security.
10 M
5(b) What is Malware? Explain Salami and Linearization attacks.
10 M

6(a) Explain Software Reverse Engineering. Also explain Digital Rights Management.
10 M
6(b) Describe the different types of IDS and their limitations.
10 M

Write short notes on (any four) :-
7(a) CAPTCHA
5 M
7(b) Access Control Matrix
5 M
7(c) Covert Channel
5 M
7(d) Firewall
5 M
7(e) RC4
5 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS