Solve any one question from Q1 and Q2

1 (a)
State the Chinese Remainder theorem with example.

6 M

1 (b)
In a public key cryptosystem using RSA, given N=187 and the encryption key (E) as 17, find out the corresponding private key (D).

4 M

2 (a)
Draw AES block diagram and explain the steps in detail.

6 M

2 (b)
Define following.

i) Discrete logarithm

ii) Fermat theorem

i) Discrete logarithm

ii) Fermat theorem

4 M

Solve any one question from Q3 and Q4

3 (a)
Explain X.509 standard for Digital Certificate.

6 M

3 (b)
Explain permutation and substitution steps in DES algorithm.

4 M

4 (a)
Using Euclidean algorithm calculate

i) GCD (48, 30)

ii) GCD (105, 80)

i) GCD (48, 30)

ii) GCD (105, 80)

4 M

4 (b)
What problem was Kerberos designed to address. Describe Kerberos realm.

6 M

Solve any one question from Q5 and Q6

5 (a)
Define IKE protocol and illustrate IKE format in detail.

8 M

5 (b)
Discuss SSL with respect to four phases

i) Establish security capabilities

ii) Server authentication and key exchange

iii) Client authentication and key exchange

iv) Finish

i) Establish security capabilities

ii) Server authentication and key exchange

iii) Client authentication and key exchange

iv) Finish

8 M

6 (a)
Explain various categories of Intrusion Detection system (IDS).

8 M

6 (b)
How AH and ESP are differs while working under transport and tunnel mode.

8 M

Solve any one question from Q7 and Q8

7 (a)
Describe the classification of Cyber Crime.

10 M

7 (b)
Define cyber security and information security with example.

6 M

8 (a)
Explain with example how social engineering is playing wide role in cyber crime.

10 M

8 (b)
Write a short note on Indian legal perspective.

6 M

Solve any one question from Q9 and Q10

9 (a)
What is SQL injection? Explain in detail.

8 M

Write short note on:

9 (b) (i)
Indian IT act

5 M

9 (b) (ii)
Different ways of password cracking

5 M

Define the differentiate:

10 (a)
Proxy server and an anonymizer.

6 M

10 (b)
DOS and DDOS

6 M

10 (c)
Virus and worm.

6 M

More question papers from Information and Cyber Security