MU Computer Engineering (Semester 7)
Cryptography & System Security
December 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) What is Multilateral Security?
5 M
1 (b) Compare Stream and Block encryption algorithms.
5 M
1 (c) Distinguish between attack, vulnerability and access control.
5 M
1 (d) What is Buffer overflow and incomplete mediation in Software Security?
5 M

2 The following questions are based on scenario in which encrypted data are passed between Alice and Bob using RSA algorithm. Alice's public key is {17, 23} and Bob's public key is {5,23}. Assume that no one knows the private keys but the original owners.
i) Encrypt the message M=7 using Bob's public key.
ii) What should Alice have to do to decrypt the message from Q-2 a?
iii) What would Bob have to do to decrypt the message from Q-2 a?
iv) What is Alice's private key?
v) What is Bob's private key?
20 M

3 (a) Explain how threat precursors are used for Reconnaissance of network.
10 M
3 (b) Upon reception of a digital certificate, how one can decide whether to trust that or not.
10 M

4 (a) Explain Physiological and Behavioral biometric techniques with example.
10 M
4 (b) Write short note on Access control List (ACL) and Capabilities.
10 M

5 (a) What is a firewall? Explain different type of firewall.
10 M
5 (b) Explain various types of port scan.
10 M

6 (a) What is spoofing? Explain ARP spoofing.
5 M
6 (b) What is SQL Injection? Give Example.
5 M
6 (c) Compare packet sniffing and packet spoofing. Explain the session hijacking attack.
10 M

Write short notes on any two
7 (a) Compare AES and DES
10 M
7 (b) Explain different Security Mechanisms.
10 M
7 (c) Various ways for Memory and Address Protection.
10 M



More question papers from Cryptography & System Security
SPONSORED ADVERTISEMENTS