You are on page 1of 2

8

Total No. of Questions : 6] SEAT No. :

-23
P259 [Total No. of Pages : 2

tic
sta
BE/INSEM/APR - 587

:36
B.E. (Computer) (Semester - II)

91
:41
410251: INFORMATION & CYBER SECURITY

13
30
(2015 Pattern)

20
01
Time : 1 Hour] /20 [Max. Marks : 30
.23 GP
/03

Instructions to the candidates :


3
CE
80

1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6.

8
23
2) Figures to the right side indicate full marks.

ic-
16

3) Assume suitable data, if necessary.

tat
8.2

6s
.24

1:3
91
49

Q1) a) Define Cryptography, Encrytion, Decryption, Plain text, Cipher text &
3:4
30

Cryptanalyst. [5]
01
01
02

b) What are different security policies? Explain. [5]


3/2
GP

OR
3/0
CE
80

Q2) a) Explain Passive and Active attacks with examples. [5]

8
-23
.23

b) What is Cryptanalysis? Explain various Cryptanalysis technique. [5]


tic
16

sta
8.2

:36

Q3) a) Write short note on Electronic code book. [5]


.24

02 91
:41
49

b) Use Playfail Cipher to encrypt the message “Weliveina world full of


13
0

beauty”. Use key ‘ANOTHER’. [5]


3/0 13

OR
8 0 P0
3/2

Q4) a) Explain DES Algorithm with diagram. [5]


G
CE

b) Explain simple columnar techniques with multiple rounds. [5]


.23
16
8.2
.24

P.T.O.
49
Q5) a) What is HMAC? Discuss different objectives of HMAC. Explain HMAC

8
-23
in brief. [5]

tic
b) Use RSA algorithm to encrypt plaintext ''3'' use following parameters

sta
p = 11, q = 3, e = 13. [5]

:36
OR

91
:41
13
Q6) a) Explain operation of MDS Message digest algorithm. [5]
30
20
01
b) Explain Elliptic curve Cryptography in detail. [5]
/20
.23 GP
3 /03
CE
80

8


23
ic-
16

tat
8.2

6s
.24

1:3
91
49

3:4
30
01
01
02
3/2
GP
3/0
CE
80

8
-23
.23

tic
16

sta
8.2

:36
.24

02 91
:41
49

13
0
3/0 13

0
8 0 P0
3/2
G
CE
.23
16
8.2
.24

BE/INSEM/APR - 587 2
49

You might also like