You are on page 1of 2

Total No. of Questions : 6] SEAT No.

8
-23
P613 [Total No. of Pages : 2

tic
sta
BE/Insem/APR - 246

:05
B.E. (Computer Engineering)

91
:27
INFORMATION AND CYBER SECURITY

13
30
(2015 Pattern) (Semester - II)

19
01
Time : 1 Hour] /20 [Max. Marks : 30
.23 GP
/03

Instructions to the candidates :


2

1) Solve Q1 or Q2, Q3 or Q4, Q5 or Q6.


CE
81

8
2) Neat diagrams must be drawn wherever necessary.

23
3) Figures to the right indicate full marks.

ic-
16

4) Assume suitable data, if necessary.

tat
8.2

5s
.24

7:0
91
Q1) a) Explain Operational Security Model for Network Security. [5]
49

3:2
30

b) How Information Security attacks are classified? Give example for each.
91

[5]
01
01
3/2
GP

OR
2/0

Q2) a) What are different security policies? Explain. [5]


CE
81

8
-23
.23

b) List the differences between Security & Privacy. [5]


tic
16

sta
8.2

Q3) a) Use PlayFair Cipher to encrypt the message “This is a columnar


:05
.24

transposition”. Use key - APPLE. [5]


01 91
:27
49

b) Explain following algorithm modes [5]


13
0

i) ECB
2/0 13

ii) OFB
8 1 P0
3/2

OR
G

Q4) a) Explain the operation of DES algorithm in detail. [5]


CE
.23

b) Explain Monoalphabetic & Polyalphabetic ciphers with appropriate


examples. [5]
16
8.2
.24

P.T.O.
49
Q5) a) Find the key exchanged between Alok and Bobby considering following

8
data.

-23
i) n = 11

tic
sta
ii) g=5

:05
iii) X = 2, Y = 3

91
:27
Find value of A, B and secret key K. [5]

13
30
b) What is Kerberos? Explain operation in detail. [5]

19
01
/20 OR
.23 GP
/03

Q6) a) Given two Prime Numbers P = 17 & Q = 29 find out N, E, & D in an


2
CE
81

RSA encryption process. [5]

8
23
ic-
b) Explain in details the need & implementation of one way hash function
16

tat
(MD5). [5]
8.2

5s
.24

7:0
91
ïïï
49

3:2
30
91
01
01
3/2
GP
2/0
CE
81

8
-23
.23

tic
16

sta
8.2

:05
.24

01 91
:27
49

13
0
2/0 13

9
8 1 P0
3/2
G
CE
.23
16
8.2
.24

BE/Insem/APR - 246 2
49

You might also like