MU Computer Engineering (Semester 7)
Cryptography & System Security
May 2012
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) What are eight security mechanisms to implement security?
5 M
1(b) Distinguish between attack, vulnerability and access control.
5 M
1(c ) What is Feistal cipher?
5 M
1(d) What is CAPTCHA?
5 M

2(a) What is race condition? Describe an example of a race condition?
10 M
2(b) What is distinction between polymorphic and metamorphic worms?
5 M
2(c) What is double transposition cipher? Describe it with example.
5 M

3(a) What are block cipher algorithmic modes? Describe any two modes.
10 M
3(b) What are Firewall design principles?
10 M

4(a) What is principle behind One-Time-Pads (OTPs)? Why they are highly secure?
10 M
4(b) What is biometric Authentication? what are two parameters defined for biometric measurement?
10 M

5(a) Describe different vulnerabilities in enterprise network with real examples.
10 M
5(b) What is Digital rights management? Describe DRM for P2P applications?
10 M

6(a) What are the strengths and limitations of intrusion detection system?
10 M
6(b) using RSA encrypt the following (i)p=3,q=11,e=7,M=12(ii)p=7,q=11,e=17,M=25(iii) Find the corresponding ds for (i) and (ii)
10 M

Solve any three :-
7(a) AES
7 M
7(b) SSL/TLS
7 M
7(c) Honeypots
7 M
7(d) MD5
7 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS