You are on page 1of 28

www.nagpurstudents.

org
B.E. (Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security

P. Pages : 2 NIR/KW/18/3691
Time : Three Hours *1348* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

s.O
7. Solve Question 11 OR Questions No. 12.

1. a) Explain different issues of information security in brief. 7

b) Explain different security services with example. 7

nt
OR

2. a) Draw and explain internetwork security model. 7


de
b) Encrypt following statement using

i) railfence technique and 3


tu

ii) 2-Columnar technique 4

"Hardwork makes a man perfect".


S

3. a) Explain centralized key distribution technique. 6

b) Explain DES algorithm in brief. 8


ur

OR

4. a) Explain Different block cipher modes of operation in detail. 9


gp

b) Explain IDEA algorithm. 5

5. a) Write R.S.A. Algorithm. Also perform encryption and decryption using RSA for 8
Na

following values P = 5, q = 11, e = 3 & M = 9.

b) Write diffie-Hellman key exchange algorithm. 5

OR

6. a) What are the different key generation techniques? Explain any one in brief. 6

b) Explain elliptic curve cryptography. 7

NIR/KW/18/3691 1 P.T.O
7. a) What is Hash function? Explain MD-5 algorithm. 7

b) What are the different type of digital certificates? 6

OR

8. a) Explain Kerberos version-4 with its dialogue in detail. 8

b) Explain PKI architecture in brief. 5

rg
9. a) Draw SSL stack and explain Handshake protocol in brief. 7

b) Explain transport layer security. 6

s.O
OR

10. a) Draw and explain IPSEC model. 7

b) Differentiate between Tunnel and transport mode of security. 6

nt
11. a) Write a note on 13

i) Phishing ii) Cross site scripting


de
iii) SQL injection iv) Buffer overflow

OR
tu

12. a) Explain in detail pretty good privacy. 7

b) What is secure electronic transaction? How does it work? 6


S

*******
ur
gp
Na

NIR/KW/18/3691 2
www.nagpurstudents.org

The secret of getting ahead is getting started.


~ Mark Twain
www.nagpurstudents.org
B.E. (Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security

P. Pages : 2 NRJ/KW/17/4747
Time : Three Hours *0179* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Illustrate your answers whenever necessary with the help of neat sketches.
12. Use of non programmable calculator is permitted.

t
1. a)

b)
detail. en
What do you mean by network security? Explain services provided by network security in

Explain Monoalphabetic cipher in detail & generate cipher text for "GOOD MORNING"
7

7
using it.
ud
OR

2. a) Explain network security Model in detail with diagram. 7


St

b) Using play for cipher, encrypt the following sting "Playfair Cipher" using key "Marshall". 7

3. Explain in Detail IDEA Algo. with key generation process in detail. 14


ur

OR

4. What is DES, Triple DES & SDES? Explain DES Algo in detail with key generation & 14
also explain Triple DES with diagram.
gp

5. a) Perform, encryption using RSA Algorithm. for given data P=07 ; q=17; 7
Plain Text : 10
Also write Algo steps
Na

b) Generate key K1 & K2 for Alice & Bob using Diffie-Hellman key exchange Also. for 6
n = 11; g = 7; x = 3 & y = 6.

OR

6. a) What WOMAN-IN-MIDDLE Attack does? Explain WOMAN IN MIDDLE attack in detail. 6

b) Explain Elliptic curve cryptography in detail. 7

NRJ/KW/17/4747 1 P.T.O
7. a) Explain kerberos authentication protocol in detail. 7

b) Explain X.509 certification revocation mechanism & format in brief. 6

OR

8. a) What is digest? Explain Message Digest 5 in detail. 7

b) Explain hash function in detail. 6

rg
9. a) What are the services provided by IPsec? Explain in detail. 7

b) Explain IPsec ESP & AH. in detail. 6

s.O
OR

10. a) Explain transport layer security & SSL/TSL in detail. 7

b) What is Firewall? Explain it with advantages. 6

t
11. a) Write note on: 13
a) PGP en
b)

OR
S/MIME

12. a) Explain in detail SET (secure electronic transaction). 7


ud
b) Explain online Ticket Booking System. 6

**********
St
ur
gp
Na

NRJ/KW/17/4747 2
www.nagpurstudents.org

It’s hard to beat a person who never gives up.


~ Babe Ruth
www.nagpurstudents.org
B.E. Eighth Semester (Computer Science & Engineering) (C.B.S.)
Information & Cyber Security

P. Pages : 2 KNT/KW/16/7609
Time : Three Hours *0346* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Illustrate your answers whenever necessary with the help of neat sketches.
12. Use of non programmable calculator is permitted.

t
1. a)

b) Explain security services in brief.


en
Explain network security and access security model in brief. 8

OR
ud
2. a) Explain principles of security in detail. 8

b) Explain any one transposition cipher. 5


St

3. a) What is AES? Explain the algorithm in detail. 9

b) Describe key generation of AES algorithm. 5


ur

OR

4. a) What is block cipher? Explain DES algorithm in detail. 10


gp

b) Differentiate between confusion & Diffusion terms in cryptography. 4

5. a) Describe Diffie-Hellman key exchange Algorithm with suitable example. What are the 8
weakness of the Algorithm Explain.
Na

b) What do you mean by man in middle Attack? Explain using Diffie-Hellman. Algorithm. 5

OR

6. a) Encrypt "Hello World'' using RSA Algorithm for the following data 8
p = 3; q = 11; e = 7; m = 5

b) Write note on ECC. 5

KNT/KW/16/7609 1 P.T.O
7. a) Explain MD5 message Digest Algorithm in detail. 7

b) Explain Hash Function. 7

OR

8. Explain Kerberos in detail. Also elaborate various steps of Kerberos version 4 in detail. 14

9. a) Explain IP Sec protocol in detail. Also write applications & advantages of IP Sec. 7

rg
b) What are the services provided by SSL record protocol? 6

OR

s.O
10. a) What do you mean by "Trusted Systems", "Intrusion Detection System" & " Intrusion 9
Prevention System".

b) Explain design principles of firewall. 4

t
11. a) What do you mean by E-mail security? Explain pretty Good privacy. 7

b) en
What do you mean by E-Transaction Attacks explain in detail.

OR
6

12. a) Explain "Payment over Internet-issues & concerns" & "Secure electronic Transaction". 7
ud
b) What is software Vulnerabilities? Explain cross-site scripting in detail. 6
St

**********
ur
gp
Na

KNT/KW/16/7609 2
www.nagpurstudents.org

It’s hard to beat a person who never gives up.


~ Babe Ruth
www.nagpurstudents.org
B.E.(Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security

P. Pages : 2 NRT/KS/19/3691
Time : Three Hours *0695* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.
11. Use of non programmable calculator is permitted.

1. a) What are the different issues in information security. Explain in brief. 7

b) Explain columnar cipher techniques with example. 6

OR

2. a) Distinguish between monoalphabetic and polyalphabetic cipher with example of each. 7

b) Draw and explain internetwork security model. 6

3. a) What is session key? Explain centralized and decentralized key distribution in brief. 8

b) Explain IDEA in brief. 6

OR

4. a) Explain data encryption standard in detail. 8

b) Explain any three block cipher modes of operation. 6

5. a) Differentiate between conventional encryption and public key encryption. 7

b) Explain ''Man in the middle attack'' in detail. 6

OR

6. a) In a public key cryptosystem using RSA. Ciphertext C = 10 sent to user whose public key 7
is e=5, n = 35 what is the plaintext?
Also write steps of RSA.

b) Explain Diffie Hellman key exchange algorithm. Clearly mention the weaknesses of this 6
algorithm.

NRT/KS/19/3691 1 P.T.O
7. a) Explain Kerberos version 4 in detail. 7

b) Draw and explain PKI Architecture. 7

OR

8. a) Explain X-509 digital certificate (directory) format. 7

b) Explain ''MD5" in detail. 7

9. a) Explain transport and tunnel mode of security in brief. 7

b) Draw and explain SSL stack format in brief. 6

OR

10. a) What do you mean by ''Intrusion detection system'' and ''intrusion prevention system''. 6

b) Explain different firewall design principles. 7

11. a) Explain pretty good privacy in detail. 8

b) Explain secure electronic transaction. 5

OR

12. a) Write a note on :-

i) Cross site scripting. 4

ii) SQL injection. 4

iii) E-transaction Attack. 5

**************

NRT/KS/19/3691 2
www.nagpurstudents.org

It’s hard to beat a person who never gives up.


~ Babe Ruth
www.nagpurstudents.org
B.E. (Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security

P. Pages : 2 NJR/KS/18/4747
Time : Three Hours *0620* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.

1. a) Define cryptography in network security. What do you understand by service, mechanism 8

nt
and attacks related to the cryptography with an example.

b) Describe conventional encryption model. What are the requirements for secure use of 6
conventional encryption?
de
OR
2. a) Write a short note on polyalphabetic ciphers with an example. 6
tu

b) Encrypt the message "Money helps to build infrastructure" using Hill cipher with the key 8
9 4
  Show your calculations and result.
5 7
S

3. a) Write a short note on-strength of DES. 6


ur

b) Explain centralized and decentralized key distribution in brief. 7

OR
4. a) Briefly Explain cipher block chaining mode of operation. 7
gp

b) Describe key generation of AES algorithm. 6

5. a) How does asymmetric key encryption ensure "Non-repudiation"? Explain with an 7


Na

example.

b) What is the role of key distribution center? What are it's drawbacks. 6

OR
6. a) Explain RSA algorithm in details. Perform encryption and decryption p = 17; q = 11; 8
e = 7; M = 88.

b) Explain about man in middle Attack. 5

NJR/KS/18/4747 1 P.T.O
7. a) Describe Diffie-Hellman key exchange Algorithm with suitable example. What are the 7
weakness of the Algorithm explain.

b) Write a short note on Hash function? Give the basic uses of hash function. 6

OR

8. a) Explain public key infrastructure architecture and its function. 6

rg
b) Explain the digital signature requirements and direct digital signature in detail. 7

9. a) Explain the SSL protocol stack in detail. 6

b) Explain the transport layer security in detail. 7

s.O
OR

10. a) What do you mean by "Trusted Systems", "Intrusion Detection system" & "Intrusion 8
Prevention system".

nt
b) Explain Applications and advantages of IP Sec. 5

11. a) How Chipcard transaction is perform? Explain in detail. 8


de
b) Describe SQL Injection in detail. 6

OR
12. a) Write a short note on any two. 14
tu

a) S|MIME

b) E-transaction attack.
S

c) Buffer Overflow
ur

*****
gp
Na

NJR/KS/18/4747 2
www.nagpurstudents.org

All our dreams can come true if we have the courage to


pursue them.
~ Walt Disney
www.nagpurstudents.org
B.E. Eighth Semester (Computer Science Engineering) (C.B.S.)
Information & Cyber Security

P. Pages : 2 NKT/KS/17/7609
Time : Three Hours *0648* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.

g
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

.Or
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Use of non programmable calculator is permitted.

ts
1. a) What do you mean by N/w security? Explain the model of network security in detail. 5

b) What are different types of attacks? Explain all category & its subtypes of attacks in detail 9
with diagram.
en
OR
ud
2. a) Explain security Attributes in detail. 9

b) Encrypt the following string using caesar cipher with key of 3 String: "Hells World". 5

3. Explain DES with neat diagram & key generation method. How key of 64 bit is trunchited 13
St

to 56 bit.

OR
r

4. a) Describe the process of key generation is AES. 6


pu

b) Explain modes of operation in detail with neat diagrams. 7

5. a) Given data is p = 07; q = 17; PT = 10 for the given data of plain text 10 (PT = 10) find the 6
cipher text (CT) using RSA algo.
Na

b) Define the Algo for key exchange in Diffie-Hellman & also calculate keys from the 7
following values. m = 11; g = 7. (assume suitable data if necessary) x = 3 & y = 6 cal k1 &
k2.

OR

6. a) Explain MAN-IN-MIDDLE Attack in detail. 6

b) Describe ECC in detail with its Also. 7

NKT/KS/17/7609 1 P.T.O
7. a) What do you mean by message Digest? Explain MD5 in detail. 7

b) Explain Public key infrastructure [PK1] in detail a with its diagram. 6

OR

8. a) Explain various steps of kerberos system in detail. 7

b) Write note on X.509. 6

9. a) What is fire wall? Explain it in detail. 7

g
b) Write a note on Network security (IP Sec.) 7

.Or
OR

10. a) What is SSL / TLS? Explain in detail. 7

ts
b) Write note on Trusted system. 7

11. a) What do you mean by e-mail security? Explain preety Good privacy. 7

b) Write note on S/MIME.


en 6

OR

12. a) What is software vulnerabilities? Explain cross site scripting. 6


ud

b) Explain E-payment with payment types. 7

*******
r St
pu
Na

NKT/KS/17/7609 2
www.nagpurstudents.org

It’s hard to beat a person who never gives up.


~ Babe Ruth
www.nagpurstudents.org
B.E. (Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security

P. Pages : 2 TKN/KS/16/7694
Time : Three Hours *0432* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.

ts
1. a) Explain the monoalphabetic cipher with examples. 6

2.
b)

a)
en
Explain the security mechanisms in details.
OR
What is security attack? Explain active and passive attacks.
7

b) Explain model of internetwork security in details. 6


ud
3. a) Explain centralized and Decentralized key distribution in brief. 7

b) Explain DES in details. 7


St

OR
4. a) Explain the modes of operation in details. 7

b) What is stream cipher and block cipher. Explain with examples. 7


ur

5. a) Explain RSA algorithm in details. Perform encryption and decryption p = 7; q = 11 ; 8


e = 17; M = 8.
gp

b) Explain about man in middle Attack. 5


OR
6. a) Describe Diffie-Hellman key exchange algorithm. Perform a = 5; q = 11; 8
X A  2 ; X B  3. Find YA , YB & K.
Na

b) Explain about ECC. 5

7. a) Explain the MD5 algorithm in details. 7

b) Discuss about PKI architecture. 6


OR
8. a) Explain various steps of Kerberos system version 5 authentication dialogue. 7

TKN/KS/16/7694 1 P.T.O
b) Explain X.509 certificate frame format. 6

9. a) Explain SSL stack in brief. 7

b) Write a note on trusted system. 6


OR
10. a) What is firewall? Write its characteristics and goals. 6

b) Describe different type of firewalls. 7

rg
11. a) Describe Buffer overflow & SQL injection. Intruders in details. 7

b) How chipcard transaction is perform? Explain in detail. 7

.O
OR
12. a) Explain E-payment with payment types. 7

ts
b) How secure electronic transaction is perform? Explain with example. 3

c) Write short notes on S/MIME. 4

en *******
ud
St
ur
gp
Na

TKN/KS/16/7694 2
www.nagpurstudents.org

High expectations are the key to everything.


~ Sam Walton

You might also like