1 (a)
Explain various types of attack on computer system.
7 M
1 (b)
What is security mechanism? List and explain various security mechanism.
7 M
2 (a)
Explain the conventional security model used for information security.
7 M
2 (b)
Explain cryptanalysis. Discuss any one technique for it.
7 M
2 (c)
What attacks can be done on encrypted text? Explain them.
7 M
3 (a)
Compare public key and private key cryptography. Also list various algorithms for each.
7 M
3 (b)
With the help of example explain how can we find out GCD of two numbers using 07
Euclid algorithm.
7 M
3 (c)
What is digital signature? Explain its use with the help of example.
7 M
3 (d)
Explain play fair cipher with suitable example.
7 M
4 (a)
Explain limitation of DES in detail.
7 M
4 (b)
List and Explain various key management techniques.
7 M
4 (c)
Explain RSA algorithm.
7 M
4 (d)
How can we achieve web security? Explain with example.
7 M
Write a note on following (Any 4):
5 (a)
Pretty Good Privacy.
4 M
5 (b)
Kerberos.
4 M
5 (c)
Hill cipher.
4 M
5 (d)
Elliptic curve cryptography.
4 M
5 (e)
Diffie-Hellman key exchange.
4 M
5 (f)
Message Authentication code.
4 M
More question papers from Information Security