MU Computer Engineering (Semester 7)
Cryptography & System Security
December 2012
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Explain Different security mechanisms.
5 M
1(b) Explain the steps used to construct knapsack cryptosystem.
5 M
1(c) What is Personal Firewall?
5 M
1(d) Explain different Targeted Malicious code.
5 M

2(a) What is difference between substitution cipher and transposition cipher? Explain additive and double transposition cipher with example?
10 M
2(b) What are the different types of vulnerabilities, threat and access control? Give example of each.
10 M

3(a) What is denial of service attack? What are the ways in which an attack can mount a DOS/DDOS attack on system?
10 M
3(b) Write short note on Access control lists and capabilities?
10 M

4(a) Explain different authentication methods and protocols?
10 M
4(b) Explain Cryptographic hash function criteria and compare MD5 and SHA-1?
10 M

5(a) Explain different types of data link layer vulnerability.
10 M
5(b) Explain various types of port scan?
10 M

6(a) Explain methods used to commit session hijack. What is SQL Injection? Give example.
10 M
6(b) What are network level threats to web server? Explain.
10 M

Write short note on the following:-
7(a) Digital Signature
5 M
7(b) Multilateral security
5 M
7(c) Digital Rights Management
5 M
7(d) Various ways of memory and address protection
5 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS