1(a)
With a neat diagram, explain network access security model with gate keeper function.
5 M
1(b)
Classify and explain different type of attacks.
8 M
1(c)
Using the keyword "ENCRYPT" create playfair matrix and obtain ciphertext for the message "MATCHFIXED". Also write the rules used.
7 M
2(a)
Explain single rorund of DES along With the key generation.
10 M
2(b)
Explain the working of counter mode of block cipher operation.
4 M
2(c)
Discuss the final evaluation criteria of AES.
6 M
3(a)
Justify how both confidentiality and authentication are obtained in publickey cryprosystems.
5 M
3(b)
Write RSA algorithm.
4 M
3(c)
In Diffie Hellman key exchange q=71, its primitive root α = 7 A's private key is 5 B's private key is 12. Find: i0 A's public key; ii) B's public key, iii) Shared secret key.
5 M
3(d)
Explain the distribution of secret key using the public key cryprography with confidentiality and authentication.
6 M
4(a)
List out the requirements and explain the arbitrated digital signature technique.
10 M
4(b)
Compare RSA and DSS approach.
6 M
4(c)
Illustrate replay attack with examples.
4 M
5(a)
Explain the key requirements and features of SET.
10 M
5(b)
Discuss SSL record in terms of fragment compression and encryption.
10 M
6(a)
Explain password selection strategies .
8 M
6(b)
Describe statistical anomaly detection.
6 M
6(c)
Discuss the different categories of intruders.
6 M
7(a)
Give the taxonomy of malicious programs. Briefly explain all the software threats.
10 M
7(b)
Describe digital immune system with diagram.
6 M
7(c)
Brief on four generations of Antivirus software.
4 M
8(a)
What is firewall? Explain the various firewall configurations with relevant diagram.
10 M
8(b)
Write short notes on:
i) Data Access Control
ii) Concept of Trusted system.
i) Data Access Control
ii) Concept of Trusted system.
10 M
More question papers from Network Security