This document appears to be an exam for a course on Information Security. It contains 5 questions with multiple parts each. Question 1 asks about cryptanalytic attacks on RSA and the Playfair cipher. Question 2 covers pseudorandom number generation, linear congruential generators, and calculating ciphertext using RSA. Question 3 discusses prime number properties, Euler's totient function, authorization requests in e-commerce, and payment gateways. Question 4 is about nonces in key distribution, Diffie-Hellman key exchange, and TLS. Question 5 addresses authentication headers in IPsec, fields in authentication headers, functions of S/MIME, ESP in IPsec, and PGP message generation.
This document appears to be an exam for a course on Information Security. It contains 5 questions with multiple parts each. Question 1 asks about cryptanalytic attacks on RSA and the Playfair cipher. Question 2 covers pseudorandom number generation, linear congruential generators, and calculating ciphertext using RSA. Question 3 discusses prime number properties, Euler's totient function, authorization requests in e-commerce, and payment gateways. Question 4 is about nonces in key distribution, Diffie-Hellman key exchange, and TLS. Question 5 addresses authentication headers in IPsec, fields in authentication headers, functions of S/MIME, ESP in IPsec, and PGP message generation.
This document appears to be an exam for a course on Information Security. It contains 5 questions with multiple parts each. Question 1 asks about cryptanalytic attacks on RSA and the Playfair cipher. Question 2 covers pseudorandom number generation, linear congruential generators, and calculating ciphertext using RSA. Question 3 discusses prime number properties, Euler's totient function, authorization requests in e-commerce, and payment gateways. Question 4 is about nonces in key distribution, Diffie-Hellman key exchange, and TLS. Question 5 addresses authentication headers in IPsec, fields in authentication headers, functions of S/MIME, ESP in IPsec, and PGP message generation.
BE - SEMESTER–VI • EXAMINATION – SUMMER 2013 Subject Code: 160702 Date: 27-05-2013 Subject Name: Information Security Time: 10.30 am - 01.00 pm Total Marks: 70 Instructions: 1. Attempt all questions. 2. Make suitable assumptions wherever necessary. 3. Figures to the right indicate full marks. Q.1 (a) (i) Define the types of cryptanalytic attacks. Which cryptnalytic attack can 04 occur on RSA algorithm? (ii) Is playfair cipher monoalphabetic cipher? Justify. Construct a playfair 03 matrix with the key “moonmission” and encrypt the message “greet”. (b) What is the difference between fiestel structure of Blowfish and cast-128? 07 Explain the fiestel structure of Blowfish and cast-128. Q.2 (a) (i) What is a pseudorandom number? Selection of which values are critical 04 in developing a good linear congruential generatos. (ii) Calculate ciphertext in case of RSA if p=3,q=11,e=3,M=5. 03 (b) Explain four passes of MD5 message digest algorithm. 07 OR (b) Explain the operation of secure hash algorithm on 512 bit block. 07 Q.3 (a) (i) Write two properties of prime numbers. 04 (ii) Explain Euler’s totient function. 03 (b) (i) What is included in authorization request sent by merchant to the payment 04 gateway in case of E-commerce transaction? (ii) Which tasks are performed by payment gateway in E-commerce 03 transaction? OR Q.3 (a) (i) Describe the three operations used by International Data Encryption 04 Algorithm. (ii) Is message authentication code same as encryption? How message 03 authentication can be done by message authentication code? (b) (i) Explain packet filtering router in case of firewall. 04 (ii) What type of verification is provided by trusted system? 03 Q.4 (a) What is a nonce in key distribution scenario? Explain the key distribution 07 scenario if A wishes to establish logical connection with B. A and B both have a master key which they share with itself and key distribution center. (b) Explain the pseudorandom function used by Transport layer security. 07 OR Q.4 (a) Write Diffie Hellman key exchange algorithm. Explain man-in-the middle 07 attack on this Diffie Hellman key exchange. (b) Explain the secure socket layer handshake protocol action. 07 Q.5 (a) What does authentication header provide in case of IP security?Explain the 07 various fields in Authentication Header. (b) Explain the functions provided by S/MIME . 07 OR Q.5 (a) How encapsulating security payload help in IP security? Explain various fields 07 in Encapsulating security payload packet. (b) What steps sending PGP(pretty good privacy) perform? Explain PGP message 07 generation. 1
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications