You are on page 1of 8

4/28/2022

4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT


25_11_IT_Sem-V_R19_CNS_FAMT

25 11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT
1) The
1) The Question
Question Paper
Paper will
will have
have MCQs
MCQs (for
(for 20
20 marks)
marks) and
and Subjective/Descriptive
Subjective/Descriptive Questions
Questions
(for 60
(for 60 marks).
marks).

2)
2) MCQ
MCQ correct
correct options
options and
and subjective
subjective question
question answers
answers to
to be
be written
written on
on A4
A4 size
size papers.
papers.
Scan
Scan all
all pages
pages of
of answer
answer papers
papers of
of Q.1
Q.1 to
to Q.4
Q.4 and
and create
create single
single file
file in
in pdf
pdf format
format to
to upload
upload in
in
the
the link
link given.
given.

** Required
Required

1.
1. Email
Email **

2.
2. Enter
Enter your
your Name
Name **

3.
3. Enter
Enter your
your Seat
Seat Number
Number **

1)
1) The
The Question
Question Paper
Paper will
will have
have MCQs
MCQs (for
(for 20
20 marks)
marks) and
and
Subjective/Descriptive
Subjective/Descriptive Questions
Questions (for
(for 60
60 marks).
marks).

2511_IT_Sem-
2511_IT_Sem- 2)
2) MCQ
MCQ correct
correct options
options andand subjective
subjective question
question answers
answers toto be
be written
written on
on A4
A4
V_R19_CNS_FAMT
V R19 CNS FAMT size
size papers.
papers. Scan
Scan all
all pages
pages ofof answer
answer papers
papers of
of Q.1
Q.1 to
to Q.4
Q.4 and
and create
create single
single
~ ~ file in
file in pdf
pdf format
format to
to upload
upload in
in the
the link
link given.
given.

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 1/5
1/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT

Q.1)
Q.1) 11to
to 55

Choose the correct option for following questions. All the Questions are
and carry marks 10=20M-
Which of the attack threatens the f?

Denial of service

Traffic 7$18

At which an , firewall works?


7 rer
rer
Network Layer
Session

In IPSEC , authentication but not


Hi mode
Tunnel Mode

Authentication Header

authenticates the sender of the

Authentication Code
Modification Detection Code

In AES. for 10 rounds how 7 round will be


10
11
09
12

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 2/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT

Q.1)
Q.1) 6
6 to
to 10
10

6. In Secure Socket Layer Protocol, a cipher suite consists of


Option A: | Master key, Client random Number and Server random number
Option B: | Master key, Premaster key and server random number
Option C: | Key exchange algorithm. Hashing algorithm and Encryption algorithm
Option D: | Key exchange algorithm, Hashing algorithm and SSL certificate

q. Ritesh received an email from his bank asking for his confidential information to
update his account by clicking on a given link. This is an example attack.
Option A: | Virus
Option B: | Trojan Horse
Option C: | Phishing
Option D: | Social Engineering

8. If Ravi wants to authenticate himself for the message that he wants to send to Dilip
using RSA cryptosystem, which key Ravi should use?
Option A: | Public key of Dilip
Option B: | Private key of Dilip
Option C: | Public key of Ravi
Option D: | Private key of Ravi

9. If the plaintext “The house is sold” is encrypted using Vigenere cipher with key
“dollars”, the ciphertext will be
Option A: | Vuo mkig ve cnbu
Option B: | Wyp
solkh
wd docy
Option C:_ | Wxp mkis ve docy
Option D: | Vue solkh ye cabu.

10. In a Network Access Control System, determines what access should


be granted to the node who is requesting it. based on enterprise’s defined policy.
Option A: | Access Requestor
Option B: | Network Access Server
Option C: | Policy Server
Option D: | Supplicant

Q.2
Q.2

Q2
A Solve any Two 5 marks each
i Use the playfais cipher to encipher the message “The key is hidden
under the door pad”. Use the word “GUIDANCE” as the key for
encryption.
ii. What is Hashed Message Authentication Code? How is it generated?
iit. Explain in brief the components and functions of Simple Network
Management Protocol.
B Solve any One 10 marks each
i. Explain various goals of security with example. Which security
mechanisms are used to fulfill these goals?
ii. What is Malware? Explain any two malware attacks with their
preventive measures.

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 3/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT

Q.3
Q.3&& Q.4
@.4

Q3
A Solve any Two 5 marks each
L “Digital signature provides authentication, integrity and non-
repudiation” True or false? Justify your answer
it. What is Network Access Control? With diagram, explain elements of
Network Access Control System?
iit. Explatn the working of IPSEC 1 its different modes.
B Solve any One 10 marks each
1L What 1s Intrusion Detection System? How signature-based IDS and
Anomaly based work? State their advantages and Immutations
it. A.and B wish to use RSA to communicate securely A chooses public
key as (7,119) and B chooses public key as (13,221)
a) Calculate pnvate key of A.
b) Calculate pnvate key of B
c) With what key B will encrypt the message M=6 1f B wants to send it
to A. Find the ciphertext for the same.

Q4
A Solve any Two 5 marks each
1. How confidentiality and integrity are achieved using record protocol of
SSL?
it. Describe the NAC enforcement methods.
iit. What is Transposition Cipher? Explain any one technique with an
example.
B Solve any One 10 marks each
1 Explain with diagram, how Kerberos can be used to perform user
authentication?
it. Describe with appropriate diagrams how cryptographic secrets are
generated in TLS?

4.
4. Upload
Upload your
your answer
answer papers
papers **

Files
Files submitted:
submitted:

5.
5. Have
Have you
you uploaded
uploaded required
required pdf
pdf file
file of
of answers?
answers? **

Mark only
Mark only one
one oval.
oval.

(_) Yes
Yes

This
This content
content is
is neither
neither created
created nor
nor endorsed
endorsed by
by Google.
Google.

Google  Forms
Forms

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 4/5
4/28/2022
4/28/2022 25_11 IT Sem-V_R19_CNS_FAMT
25_11_IT_Sem-V_R19_CNS_FAMT

https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51lgXHHyA6TCnTio3rOjk/edit 5/5
FB A8 093 2F8 3D 989 5B A53 BE 353 DA
A 09 2F 3D 98 5B A5 B 35 D 88
A8 8093 32F 83D 989 95B A5 3BE E353 3DAA88 A89
0 8 9 A 3 3 A
80 932 2F83 3D9 895 5BA 53B BE3 53DDA8 88A 89F FBA
93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
09 2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93
3 9 3 9 32404
93 2F8 83D 989 5BAA53 3BE 353 DA 88AA89 FBAA80 0932 2F83
2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93 F8 D

N.
Monday,

32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98

Q.
Q.
Q.
Q.
Q.
Q.
Q.
F D 89 B 53 E 53 A 8 89 B 80 3 8 9 9

B:

2.
3.
1.

59728
N. B:

3.
2.
1.
F8 83D9 989 5BAA53 BE 353 DA 88AA89 FBAA80 932 2F83 3D9 895 5BA
3 5 B 3 D 8 F 9 F 8 5

59728
Q.2a)
c)
d)
Monday, May

b)
b)
b)

c)
d)

a)
a)
a)
a)

2 a)

Q.6.a)
b)
83 D98 895 BA 53B E35 53D A8 8A8 89F BA8 809 32F 83DD98 95B BA5 3BE

b)
b)
b)b)
b)

Q.55 a)
Q.44 a)
Q.33 a)
Q.11 a)

b)

Q.66 b)
D9 95 BA 53 E3 3D A8 8A 9F BA 09 32 83 9 95 A 3B 3
May 27,

D9 895 BA 53 BE3 53D A8 8A 89F BA 809 32 F83 D9 895 BA 53B E3 53D


8 B 5 8 F D 8 B 5 E 5 A

Draw
Solve

A
A

in
98 95B BA5 53BE E35 3DAA88 8A8 9FB BA8 8093 32F8 83D 989 95B A53 3BE 353 3DA 88A

the
the
32404 -- Cryptography

95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8

and
27, 2019

BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F

Two

b) How
must
Question
Cryptography &

What
What
What

and d

in the
Show

6 a) Write
Solve any

Given
Triple
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
neat

Define
Define

A user
protocol
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80

provide
What is

Explain
must be

Encrypt
What is

the help
Question No.

What is

the need
mounted
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932

A secure

aa session
Compare

Two uses

algorithm
How does
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8

advantages.
Paper

help of

distributed
2019 02:30

need of
Show how
well

mounted at
DES?

is the

Explain the

d using
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D

advantages.
is the

Write short
be met

Define ARP
Triple DES?

Define DOS
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98

key
No. 1| is
& Network

Compare and

algorithm iii)
Encrypt “This
02:30 pm

provide server
any THREE

89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95

uses wish

protocol which
user wishes

of AH
Given modulus
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA

“This is
met and

does IPSec
the handshake
the steps
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53

wish to

using RSA.
KDC.
secure e-voting

distributed systems

wishes to
after
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE

short notes
of aa KDC.
labeled

server side
at various

systems

which can

AH and
is the
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
THREE from

DOS attack.
pm-05:30
Paper // Subject

Security

is aa firewall?
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D

how Kerberos

IPSec help
Network Security

can be
ARP spoofing

and contrast

to do
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A

the drawback
and enlist

modulus n=221

side and
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
pm

ESP.
help to
the significance

iii) El-Gamal
handshake process.
- 05:30 pm

the final
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8

and ESP.
drawback of

layers.

process.
e-voting system
Compulsory.

involved.

mutual

RSA. Encrypt
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F

various layers.
attack. Show
spoofing with
significance of

n=221 and
is Compulsory.

to establish
steps involved.

notes on(any
contrast DES
Subject Code:

be used
diagram

system is

53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA


BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80

do online
from Question

and client
with an

firewall? Explain
used to
Show the
is to

35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932

M=5.

Kerberos protocol
DES and
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8

final exam”

Encrypt M=5.

to achieve
Question No.
59728

and public
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
of Double
to be

to set
59728

on(any two):
Algorithm
client side
Code: 32404

8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98

El-Gamal Algorithm
protocol can
enlist mechanisms

of aa digital

establish aa secure
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
1T01225

AES.
exam” with

two): i)
set up
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA

and AES.
wherever
No. 22 to
Time

public key,

can be
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
Double DES
mechanisms for

an example.

Explain different
the different
6.

09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE


to 6.
Time (3

32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35

authentication.
=1T01225 -- T.E.

for the

online transactions
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
be designed.

key, e=7,
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A

i) Email
be used
with Playfair
digital signature

98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A

different ways

up aa secure

different types
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8

achieve authentication
used to
Draw neat well labeled diagram wherever necessary.
Hours)

BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F

Show
same.

transactions with
ways by
signature on

OK 2g 2s 24s 2s 2s 2k ois 2k 2K 2c 2 2 2k ok 2k
necessary.

e=7, find
(3 Hours)

the same.

****************
example. Compare

53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA

side authentication.

types of
DES algorithm?

BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80

authentication and
32404 // Cryptography

Playfair cipher

secure communication
designed. Discuss

35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932

find the
how
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8

Email security
Compare with
Cryptography &

A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D


Discuss the

authentication. Show
by which

to achieve
algorithm? How

8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98


with IP

this

security ii)
T.E. (INFORMATION

88A89FBA80932F83D9895BAS53BE353DA
88A89FBA80932F83D9895BA53BE353DA
cipher using

89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95


How is

FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA

the values

of firewalls
Show the
communication channel

A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53

which this
is it

can
on a a certificate?

using key

09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE

secure communication
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
values of

achieve single

with Amazon.com.
of p,
be
& Network

F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
the security

firewalls and
channel and

ii) Diffie
the steps
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
spoofing.
IP spoofing.

98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A

this attack
p, q,

and confidentiality?
Justify

95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8

and list
certificate? Justify

BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
done
security goals

communication channel
[Total

53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA


it overcome

attack can

single sign-on
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80

Amazon.com. Discuss
Security
(INFORMATION TECHNOLOGY)

exchange
“Guidance’’.
Network Security

Hellman
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
phi(n),

involved
with

and

Justify
can be
by
that

their
in

Discuss aa
q, phi(n),

be
and exchange

channel and
key “Guidance”.

session key after mutual authentication. Show how this can be done with
overcome by
goals that

confidentiality? Justify
steps involved

list their

Diffie Hellman
sign-on in
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83
[Total Marks
TECHNOLOGY) (Sem

89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83


FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D
80]
(Sem V)

Marks 80]

A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D


09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 98
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98

(10)
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 9

(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)
(5)

(10)
(10)
(5)

(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)

3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5
V) (Choice

95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53
(Choice Based)

3D 8 A8 9F A 09 2F 3D 98 5B A5
Based)/ /

A8 8A 9F BA 809 32F 83 98 95B A5 3B


8A 89F BA 80 32 83 D9 95 A 3B
89 BA 80 932 F83 D9 895 BA 53B E
6F 4 F CA 8 0 1 90 36 2
6F C4C CF1 1CA 588 890DD1DD90 136 62E E63A
C F C 58 9 1 9 13 62 6 2
C4 4CF 1CAA58 890 0D1 D90 0136 662 E63 3A2 1B1
CF 1C 58 89 D1 D9 13 62 E63 A2 1B 6F
4C 1C A5 8 0D D 01 66 E6 A 1B 16 C4
9 9 F
CF F1C A58 889 0D1 1D9 013 3662 2E63 3A2 21B 16F C4C CF1
1 A 8 0 D D 0 6 E A 1 1 6 C C
F1 CA 588 90D 1D 901 136 62E 63A 21 B16 FC 4CF F1C A5

Q.
Q.
Q.
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88

Q.4
Q.3
Q.2
Q.1
N.B.

79115
CA 58 890 D1 D90 136 62E 63 A21 B1 6FC 4C F1C A5 88 90D
8 D D 1 A 6 F 9 1
Network

79115
No.
Q. No.

Q.3 (a)
Q.2 (a)

Q.4 (a)
Q.1 (a)

(c)
A5 5889 90D 1D 901 366 62E6 63A 21B B16 FC4 4CF 1CAA58 8890 0D1 D90

(b)
(b)
(b)
(d)
(b)
9 3 F

Q. 55 (a)
(b)
88 0D 1D 01 66 2E 3A 21 16 C CF 1C 58 89 D1 D9 13

i)
25-Nov-2019

v)
N.B. :: (1)

ii)
58 90 1 90 36 2 63 2 B1 FC 4C 1C A5 8 0D D 01 66
8 D E 1 9 9
25-Nov-2019

vi)
iv)
(2)

iii)
Q. 66 Write
and
(d) List
88 90DD1D 901 1366 62E 63AA21 B16 6FC 4CF F1C A58 889 0D1 1D9 013 3662 2E6

Instructions
Security

90 1D 90 36 2E 63 21 B1 FC 4C 1C A5 89 0D D 01 66 E6 3A

What
(a) Write

(c) Write
(b) Write
Network Security

89 D1 9 13 62 6 A2 B 6F 4 F1 A 88 0 1D 90 36 2E 3 21

11) ARP
iii) Port
(a) Explain
(a) Explain
Instructions to
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1

Is
(a) Perform

diagram.
(a) Explain

Write short
Explain
M=8.
(b) Describe
(b) Compare
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F

1) HMAC
diagram.
and M=8.

vi) Session
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4

Write short
(2) Attempt

Write short
(1) Question
to the

Honeypot
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF

HMAC vs

v) EI-Gamal
Describe the

iv) Honeypot
Write aa short

PKI.
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C

List S/MIME

Compare and
1T01225

short notes
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
Paper

Question No.

Explain Diffie
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58 Attempt any

short note

Spoofing
Scanning
short note
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89

ARP Spoofing
Port Scanning
Explain Kerberos

notes on
79115

short note
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D
79115

CMAC
the Block
note on

Perform encryption
note on
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
No. 1| is

vs CMAC

Hijacking
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90

note on

Session Hijacking
any three

Explain
services.

and contrast
Explain Transposition

Algorithm
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13

S/MIME services.

El-Gamal Algorithm
on (Any
encryption and
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662

Diffie Hellman
the candidates,
Paper // Subject

CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
candidates, if

Kerberos Protocol
Block Cipher
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A

contrast DES
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21

Hellman Key

Four)
Protocol in
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1

Needham-Schroeder

(Any Four)
1701225 -- T.E.(Information

Blowfish.

Transposition Ciphers
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F

different
on Blowfish.
Subject Code:

DES and
any:-
compulsory.
three questions

90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4


Stenography.
if any:-
is compulsory.

on Stenography.
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
eavesdropping.

Cipher Modes
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C

and decryption

detail.
on eavesdropping.

(b) What Is PKI. Explain different PKI


Ciphers with
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
questions out

in detail.
AES.

Modes in
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58

and AES.
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
Code: 32404

out of

protocol
Key Exchange
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D

decryption using
Duration

16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
T.E.(Information Technology

for
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90

detail.
in detail.
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
Duration :: 3

Exchange with
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662

using RSA
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
with illustrative

58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A

secret
PKI architectures
of remaining

89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
Hours

0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1

architectures in
3 Hours

1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F

with suitable
key
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
remaining five

13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
32404 // Cryptography

Example.

66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C

______________________
RSA algorithm
illustrative Example.

2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A

detail.
in detail.
Cryptography &

63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889 0D

21B16FC4CF1CA58890D1D9013662E63A
Example.
algorithm with

16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D

suitable Example.
questions.

FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
five questions.

distribution
4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890 D1 D9 13
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
& Network
Technology Engineering)(SEM-V)(Choice

58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A

(b) Explain Needham-Schroeder protocol for secret key distribution with


89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
Engineering)(SEM-V)(Choice Base)

13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
with p=7,q=11,e=17
Security

66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
suitable
Network Security

p=7,q=11,e=17

with suitable
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 8
Total

1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889


Base) // 32404

16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90

(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)
(05)
(05)
Marks

(05)
(05)

(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)

4C F1C A5 88 0D 1D 01 366 2E6 3A 21B 16 C4 CF 1C 58 890


Marks

F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D
Total Marks:

58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D


89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D
80

0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9
Marks: 80

1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01
32404 -- Cryptography

13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01
&

66 E6 A 1B 6F C4 F CA 58 90 1 90 3
Cryptography &

2E 3A 21 16 C CF 1C 5 89 D1 D9 13
63 21 B1 FC 4C 1C A5 889 0D D 01 6
A2 B 6F 4 F1 A 88 0D 1D 90 36
1B 16F C4 CF CA 58 90 1D 90 136 62
16 C4 CF 1C 58 890 D1 9 13 62
A 0
Paper / Subject Code: 32404 / Cryptography & Network Security
T.E. SEM V/ IT / CHOICE BASED / NOV 2018 / 05.12.2018

Time (3 Hours) [Total Marks 80]

N.B:
1. Question No. 1 is Compulsory.
2. Solve any THREE from Question No. 2 to 6.
3. Draw neat well labeled diagram wherever necessary.

Q.1 a) _ Enlist security goals. Discuss their significance. (5)


b) Compare and contrast HMAC and CMAC. (5)
c) SHA provides better security than MD. Justify. (5)
d) Design Sample Digital Certificate and explain each field of it. (5)

Q.2a) Explain Transposition Ciphers with illustrative examples. (10)


b) Given modulus n=91 and public key, e=5, find the values of p, q, phi(n), (10)
™ and d using RSA. Encrypt M=25. Also perform decryption.

Q.3 a) What are Block Cipher Modes. Describe any two in detail. (10)
b) Using Affine cipher, encrypt the Plaintext ‘SECURITY’ with key pair (10)

(5, 2).
Q.4 a) Given generator g= 2 and n=11. Using Diffie Hellman algorithm solve the (10)
following:
1. Show that 2 is primitive root of 11
2. IfA’s public key is 9, whatis A’s private key?
3. IfB’s public key is 3, what is B’s private key?
4. Calculate the shared secret key.

b) Explain different types of Denial of Service attacks. (10)

Q.5 a) What is Authentication? Explain Needham Schroeder Authentication (10)


protocol.
™ b) What is.a-firewall? Explain different types of firewall. (10)
Q. 6 Write short notes on any FOUR: (20)
1. Email Security
te SSL/TLS
B.. IPSec
4. Port Scanning.
5. Honey pots
25 2 2k 2 2g 2 2g 2 2k 2k 2k 2k 2 ok 2 2K 2k 2K Ok OK

59727 .
86A0798576FOEC29F86CCD3F438074A5

You might also like