Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views1 page

Cryptography and System Security

The document outlines an examination paper for a course on Cryptography and System Security, lasting 3 hours and worth a maximum of 80 marks. It includes instructions for answering questions, such as attempting four out of five questions, and covers various topics like digital signatures, encryption algorithms, and security protocols. The paper consists of multiple sections with specific questions related to cryptography concepts and techniques.

Uploaded by

fabunique2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views1 page

Cryptography and System Security

The document outlines an examination paper for a course on Cryptography and System Security, lasting 3 hours and worth a maximum of 80 marks. It includes instructions for answering questions, such as attempting four out of five questions, and covers various topics like digital signatures, encryption algorithms, and security protocols. The paper consists of multiple sections with specific questions related to cryptography concepts and techniques.

Uploaded by

fabunique2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

8

B5
8

4B
3D
79

9
Paper / Subject Code: 37472 / Cryptography and System Security

16
8C
82
8C
88

B5
4B
3D
01

79

9
16
8C
82
E2

8C
88

B5
4B
3D
49

79
Duration: 3hrs [Max Marks:80]

8C
2
83

E2

C
8

8
18

B
3D
B9

79

4
4

20
N.B. : (1) Question No 1 is Compulsory.

82
3
3A

8C
8
98

8
(2) Attempt any three questions out of the remaining five.

4B
3D
9

01

79
95

2
83

E2
A
(3) All questions carry equal marks.

8C
88
16

D8
3

01
B5

79
5
(4) Assume suitable data, if required and state it clearly.

C3
9

E2
3A

8
6
8C

98

8
51

98
9

01
95
4B

34
B

7
1 Attempt any FOUR [20]

E2
A

88
6
C
82

8
51

3
8

B9

01

9
5
B
3D
a Describe services and mechanisms.

4
B

87
9
4

83

E2
3A
16
C
2
8C

18
8
8

B9

49
B5
b ECB and CBC block cipher.

95
4B
3D

20
79

83
A
6
C
82
C

E
88

51

3
8
c Why digital signature and digital certificates are required?

B9

9
8

95
B
3D
01

4
B
9

83
3A
7

6
C
82
E2

8C
8
d What is keyed and keyless transposition ciphers?

1
8

9
8

9
B5

95
4B
3D

AB
49

34
79
0

16
8C
e Explain clickjacking and session hijacking.

82
83

98
C
88

53
9E

B5
8

B
D
B9

AB
1

9
4
34

20

C3
7

6
C
82
3A

2 a Explain DES algorithm with reference to following points: 88 [10]

53
8
98

B5
98

4B
3D
9

01
95

1. Block size and key size

69
B

8C
2
3

E2
A

C
88
16

51
2. Need of expansion permutation

D8
8

8
3

B
9

01
B5

CB
9
95

24
4

3. Role of S-box

C3
87
3

E2
3A
6
8C

B8
D8
8

8
51

4. Possible attacks on DES

98
B9

1
5
4B

24
4

20
B

b Use the playfair cipher with the keyword “example” to encipher “The algorithm

C3
7
9

[10]
83
A

88
6
C
82

D8
9E
1

98
3

name is playfair cipher”


8

B9

01
5

5
B
3D

4
B

C3
87
9
4

83

E2
3A
6
8C
2
8C

18
1

98
8

B9

49
B5

95
B
3D

20
79

87
3 a What are properties of hash function? Compare MD-5 and SHA hash algorithm. [10]
4

83
A
16
8C
82
C

E
88

18
3

B9

9
B5
8

5
B
3D
01

20
79

b Explain Diffie hellman key exchange algorithm. [10]


4

83
3A
16
C
2
E2

8C

9E
8

8
8

9
18

B5

95
4B
D

AB
49

34
79
20

16
C
82
83

98
C
8

53
8
9E

4 a What do you understand by digital signatures and digital certificates? Explain digital
8

[10]
B
D
B9

AB
01

B
9

69
4
34

3
7

signature scheme RSA.


2
2
3A

8C
88

53
B8
8
8

B5
3D
B9

b Explain memory and address protection in detail. Write a note on file protection. [10]
9

01

79
95

69
24
4

8C
3

E2
3A

C
88

51
D8
98

B
49

01

CB
9
95

24
C3
7
83

2
A

8
6

5 a Enlist various functions of protocols of SSL. Explain the phases of handshake


B8

[10]
D8
E

8
51

98
3

B9

1
95

24

protocol.
4

0
B

3
87
83

E2
A

C
6
8C

D8
8
1

b Briefly explain database security. What do you understand by multilevel database [10]
8
3

B9

01
B5

9
95
4B

C3
87

security.
3

E2
A
6
8C

18
51

98
3

B9

9
5
B

20
B

87
9
4

3
A
6
C
2

18
1

6 Write short notes on any four: [20]


3
8
D8

9
B5

5
4B

20
9

3
C3

3A
16
C

a Web browser attacks


2

9E
B8
D8

9
B5
98

95

AB

34
4
C3

b X.509
16
C
82

98
53
8

5
98

B
3D

AB
B

c Cross site request forgery


4
87

6
C
2
C

53
B8
D8
18

5
98

d DNS attack
CB

69
24
20

3
87

8C

51
8
D8
E

18

e Email attacks.
B
49

CB
79

4
20

C3

2
88

B8

_____________________________
D8
E

98
9

01

24
4

3
87
3

D8
98

9E

98
01
AB

34

29724 Page 1 of 1
C3
87
E2
98

18

98
53

49
AB

20

87
83

9E

18
53

B9

53AB98349E20188798C3D824B8CB5169
34

20

You might also like