Professional Documents
Culture Documents
org
B.E. (Computer Science & Engineering) Eighth Semester (C.B.S.)
Information & Cyber Security
P. Pages : 2 NIR/KW/18/3691
Time : Three Hours *1348* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
s.O
7. Solve Question 11 OR Questions No. 12.
nt
OR
OR
5. a) Write R.S.A. Algorithm. Also perform encryption and decryption using RSA for 8
Na
OR
6. a) What are the different key generation techniques? Explain any one in brief. 6
NIR/KW/18/3691 1 P.T.O
7. a) What is Hash function? Explain MD-5 algorithm. 7
OR
rg
9. a) Draw SSL stack and explain Handshake protocol in brief. 7
s.O
OR
nt
11. a) Write a note on 13
OR
tu
*******
ur
gp
Na
NIR/KW/18/3691 2
www.nagpurstudents.org
P. Pages : 2 NRJ/KW/17/4747
Time : Three Hours *0179* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Illustrate your answers whenever necessary with the help of neat sketches.
12. Use of non programmable calculator is permitted.
t
1. a)
b)
detail. en
What do you mean by network security? Explain services provided by network security in
Explain Monoalphabetic cipher in detail & generate cipher text for "GOOD MORNING"
7
7
using it.
ud
OR
b) Using play for cipher, encrypt the following sting "Playfair Cipher" using key "Marshall". 7
OR
4. What is DES, Triple DES & SDES? Explain DES Algo in detail with key generation & 14
also explain Triple DES with diagram.
gp
5. a) Perform, encryption using RSA Algorithm. for given data P=07 ; q=17; 7
Plain Text : 10
Also write Algo steps
Na
b) Generate key K1 & K2 for Alice & Bob using Diffie-Hellman key exchange Also. for 6
n = 11; g = 7; x = 3 & y = 6.
OR
NRJ/KW/17/4747 1 P.T.O
7. a) Explain kerberos authentication protocol in detail. 7
OR
rg
9. a) What are the services provided by IPsec? Explain in detail. 7
s.O
OR
t
11. a) Write note on: 13
a) PGP en
b)
OR
S/MIME
**********
St
ur
gp
Na
NRJ/KW/17/4747 2
www.nagpurstudents.org
P. Pages : 2 KNT/KW/16/7609
Time : Three Hours *0346* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Illustrate your answers whenever necessary with the help of neat sketches.
12. Use of non programmable calculator is permitted.
t
1. a)
OR
ud
2. a) Explain principles of security in detail. 8
OR
5. a) Describe Diffie-Hellman key exchange Algorithm with suitable example. What are the 8
weakness of the Algorithm Explain.
Na
b) What do you mean by man in middle Attack? Explain using Diffie-Hellman. Algorithm. 5
OR
6. a) Encrypt "Hello World'' using RSA Algorithm for the following data 8
p = 3; q = 11; e = 7; m = 5
KNT/KW/16/7609 1 P.T.O
7. a) Explain MD5 message Digest Algorithm in detail. 7
OR
8. Explain Kerberos in detail. Also elaborate various steps of Kerberos version 4 in detail. 14
9. a) Explain IP Sec protocol in detail. Also write applications & advantages of IP Sec. 7
rg
b) What are the services provided by SSL record protocol? 6
OR
s.O
10. a) What do you mean by "Trusted Systems", "Intrusion Detection System" & " Intrusion 9
Prevention System".
t
11. a) What do you mean by E-mail security? Explain pretty Good privacy. 7
b) en
What do you mean by E-Transaction Attacks explain in detail.
OR
6
12. a) Explain "Payment over Internet-issues & concerns" & "Secure electronic Transaction". 7
ud
b) What is software Vulnerabilities? Explain cross-site scripting in detail. 6
St
**********
ur
gp
Na
KNT/KW/16/7609 2
www.nagpurstudents.org
P. Pages : 2 NRT/KS/19/3691
Time : Three Hours *0695* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.
11. Use of non programmable calculator is permitted.
OR
3. a) What is session key? Explain centralized and decentralized key distribution in brief. 8
OR
OR
6. a) In a public key cryptosystem using RSA. Ciphertext C = 10 sent to user whose public key 7
is e=5, n = 35 what is the plaintext?
Also write steps of RSA.
b) Explain Diffie Hellman key exchange algorithm. Clearly mention the weaknesses of this 6
algorithm.
NRT/KS/19/3691 1 P.T.O
7. a) Explain Kerberos version 4 in detail. 7
OR
OR
10. a) What do you mean by ''Intrusion detection system'' and ''intrusion prevention system''. 6
OR
**************
NRT/KS/19/3691 2
www.nagpurstudents.org
P. Pages : 2 NJR/KS/18/4747
Time : Three Hours *0620* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
s.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.
nt
and attacks related to the cryptography with an example.
b) Describe conventional encryption model. What are the requirements for secure use of 6
conventional encryption?
de
OR
2. a) Write a short note on polyalphabetic ciphers with an example. 6
tu
b) Encrypt the message "Money helps to build infrastructure" using Hill cipher with the key 8
9 4
Show your calculations and result.
5 7
S
OR
4. a) Briefly Explain cipher block chaining mode of operation. 7
gp
example.
b) What is the role of key distribution center? What are it's drawbacks. 6
OR
6. a) Explain RSA algorithm in details. Perform encryption and decryption p = 17; q = 11; 8
e = 7; M = 88.
NJR/KS/18/4747 1 P.T.O
7. a) Describe Diffie-Hellman key exchange Algorithm with suitable example. What are the 7
weakness of the Algorithm explain.
b) Write a short note on Hash function? Give the basic uses of hash function. 6
OR
rg
b) Explain the digital signature requirements and direct digital signature in detail. 7
s.O
OR
10. a) What do you mean by "Trusted Systems", "Intrusion Detection system" & "Intrusion 8
Prevention system".
nt
b) Explain Applications and advantages of IP Sec. 5
OR
12. a) Write a short note on any two. 14
tu
a) S|MIME
b) E-transaction attack.
S
c) Buffer Overflow
ur
*****
gp
Na
NJR/KS/18/4747 2
www.nagpurstudents.org
P. Pages : 2 NKT/KS/17/7609
Time : Three Hours *0648* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
3. Solve Question 3 OR Questions No. 4.
g
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
.Or
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Diagrams should be given whenever necessary.
11. Use of non programmable calculator is permitted.
ts
1. a) What do you mean by N/w security? Explain the model of network security in detail. 5
b) What are different types of attacks? Explain all category & its subtypes of attacks in detail 9
with diagram.
en
OR
ud
2. a) Explain security Attributes in detail. 9
b) Encrypt the following string using caesar cipher with key of 3 String: "Hells World". 5
3. Explain DES with neat diagram & key generation method. How key of 64 bit is trunchited 13
St
to 56 bit.
OR
r
5. a) Given data is p = 07; q = 17; PT = 10 for the given data of plain text 10 (PT = 10) find the 6
cipher text (CT) using RSA algo.
Na
b) Define the Algo for key exchange in Diffie-Hellman & also calculate keys from the 7
following values. m = 11; g = 7. (assume suitable data if necessary) x = 3 & y = 6 cal k1 &
k2.
OR
NKT/KS/17/7609 1 P.T.O
7. a) What do you mean by message Digest? Explain MD5 in detail. 7
OR
g
b) Write a note on Network security (IP Sec.) 7
.Or
OR
ts
b) Write note on Trusted system. 7
11. a) What do you mean by e-mail security? Explain preety Good privacy. 7
OR
*******
r St
pu
Na
NKT/KS/17/7609 2
www.nagpurstudents.org
P. Pages : 2 TKN/KS/16/7694
Time : Three Hours *0432* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
.O
7. Solve Question 11 OR Questions No. 12.
8. Due credit will be given to neatness and adequate dimensions.
9. Assume suitable data whenever necessary.
10. Illustrate your answers whenever necessary with the help of neat sketches.
ts
1. a) Explain the monoalphabetic cipher with examples. 6
2.
b)
a)
en
Explain the security mechanisms in details.
OR
What is security attack? Explain active and passive attacks.
7
OR
4. a) Explain the modes of operation in details. 7
TKN/KS/16/7694 1 P.T.O
b) Explain X.509 certificate frame format. 6
rg
11. a) Describe Buffer overflow & SQL injection. Intruders in details. 7
.O
OR
12. a) Explain E-payment with payment types. 7
ts
b) How secure electronic transaction is perform? Explain with example. 3
en *******
ud
St
ur
gp
Na
TKN/KS/16/7694 2
www.nagpurstudents.org