Professional Documents
Culture Documents
25_11_IT_Sem-V_R19_CNS_FAMT
1) The Question Paper will have MCQs (for 20 marks) and Subjective/Descriptive Questions
(for 60 marks).
2) MCQ correct options and subjective question answers to be written on A4 size papers.
Scan all pages of answer papers of Q.1 to Q.4 and create single file in pdf format to upload in
the link given.
* Required
1. Email *
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 1/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT
Q.1) 1 to 5
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 2/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT
Q.1) 6 to 10
Q.2
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 3/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT
Files submitted:
Yes
Forms
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 4/5
4/28/2022 25_11_IT_Sem-V_R19_CNS_FAMT
https://docs.google.com/forms/d/1Dm0cJ7MpcEvcNnB4pexRgRi51gXHHyA6TCnTio3rOjk/edit 5/5
FB A8 093 2F8 3D 989 5B A53 BE 353 DA
A 09 2F 3D 98 5B A5 B 35 D 88
A8 8093 32F 83D 989 95B A5 3BE E353 3DAA88 A89
0 8 9 A 3 3 A
80 932 2F83 3D9 895 5BA 53B BE3 53DDA8 88A 89F FBA
93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
09 2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93
3 9 3 9
93 2F8 83D 989 5BAA53 3BE 353 DA 88AA89 FBAA80 0932 2F83
2F 3D 98 5B 5 BE 35 DA 88 8 FB 8 93 F8 D
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98
F D 89 B 53 E 53 A 8 89 B 80 3 8 9 9
N. B:
F8 83D9 989 5BAA53 BE 353 DA 88AA89 FBAA80 932 2F83 3D9 895 5BA
3 5 B 3 D 8 F 9 F 8 5
59728
c)
d)
Q. 2 a)
83 D98 895 BA 53B E35 53D A8 8A8 89F BA8 809 32F 83DD98 95B BA5 3BE
b)
b)
b)
b)
Q. 5 a)
Q. 4 a)
Q. 3 a)
Q. 1 a)
b)
D9 95 BA 53 E3 3D A8 8A 9F BA 09 32 83 9 95 A 3B 3
D9 895 BA 53 BE3 53D A8 8A 89F BA 809 32 F83 D9 895 BA 53B E3 53D
8 B 5 8 F D 8 B 5 E 5 A
98 95B BA5 53BE E35 3DAA88 8A8 9FB BA8 8093 32F8 83D 989 95B A53 3BE 353 3DA 88A
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
advantages.
Triple DES?
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE
distributed systems
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
32404 - Cryptography & Network Security
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
Monday, May 27, 2019 02:30 pm - 05:30 pm
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5B 53 BE 353 DA 88A
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
3. Draw neat well labeled diagram wherever necessary.
Time (3 Hours)
****************
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE 353 DA 88A 89 FB 80 932
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F 3D
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83D 98
88A89FBA80932F83D9895BA53BE353DA
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83 98 95
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D9 95 BA
A8 093 2F 3D 989 5B A5 BE 353 DA 88 89 FB A8 93 F8 3D 89 BA 53
09 2F 83D 98 5B A5 3BE 35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53 BE
32 83 9 95 A 3B 3 3D 8 A 9F A 09 2F 3D 98 5B A5 B 35
F8 D9 89 BA 53 E 53 A 8A 89 BA 80 32 83 9 95 A 3B E3 3D
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89 BA 53 E 53 A
Define ARP spoofing with an example. Compare with IP spoofing.
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95 A 3B E3 3D A8 A 9F
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA 53 E 53 A 8A 89 BA 80
Paper / Subject Code: 32404 / Cryptography & Network Security
Define DOS attack. Show the different ways by which this attack can be
Two uses wish to establish a secure communication channel and exchange
Q. 6 a) Write short notes on(any two): i) Email security ii) Diffie Hellman
Show how Kerberos protocol can be used to achieve single sign-on in
3D 8 A8 9F A 09 2F 3D 98 5B A5 B 35 D 88 8 FB A8 93 F8
A8 8A 9F BA 809 32F 83 98 95B A5 3B E35 3D A8 A8 9FB A8 09 2F
8A 89F BA 80 32 83 D9 95 A 3B E3 3D A8 8A 9F A 09 32F 83
89 BA 80 932 F83 D9 895 BA 53B E3 53D A8 8A 89F BA 809 32 83
FB 8 93 F8 D 89 B 53 E 53 A 8A 89 B 80 32 F8 D
[Total Marks 80]
(10)
(10)
(5)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(5)
(5)
(5)
3D 89 5B 5 BE 353 DA 88 89 FB 80 93 F8 D 89
98 5B A5 3BE 35 DA 88 A8 FB A8 93 2F8 3D 989 5
95 A 3B 3 3D 8 A8 9F A 09 2F 3D 98 5B
BA 53 E3 53 A 8A 9F BA 80 32 83 9 95
53 BE3 53 DA 88A 89 BA 80 932 F83 D9 895 BA
BE 53 DA 88 89 FB 8 93 F8 D 89 BA
35 DA 88 A8 FB A8 093 2F8 3D 989 5B 53
3D 8 A8 9F A 09 2F 3D 98 5B A5
1T01225 - T.E. (INFORMATION TECHNOLOGY) (Sem V) (Choice Based) /
79115
Q. No.
A5 5889 90D 1D 901 366 62E6 63A 21B B16 FC4 4CF 1CAA58 8890 0D1 D90
9 3 F
88 0D 1D 01 66 2E 3A 21 16 C CF 1C 58 89 D1 D9 13
58 90 1 90 36 2 63 2 B1 FC 4C 1C A5 8 0D D 01 66
8 D E 1 9 9
88 90DD1D 901 1366 62E 63AA21 B16 6FC 4CF F1C A58 889 0D1 1D9 013 3662 2E6
90 1D 90 36 2E 63 21 B1 FC 4C 1C A5 89 0D D 01 66 E6 3A
Network Security
89 D1 9 13 62 6 A2 B 6F 4 F1 A 88 0 1D 90 36 2E 3 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9 013 662 E6 A2 1B 6F
diagram.
and M=8.
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01 66 E6 3A 1B 16F C4
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01 36 2E 3A 21 16 C CF
iv) Honeypot
66 E6 A 1B 6F C4 F CA 58 90 1 90 36 62 63 2 B1 FC 4C 1C
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 89
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
i) HMAC vs CMAC
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90 1 90
v) EI-Gamal Algorithm
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1 D9 013 662
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D D 01 66 E6
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D 901 366 2E 3A
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D 90 36 2E 63 21
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9 13 62 63 A2 B1
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
______________________
Q.2 (a) Explain Transposition Ciphers with illustrative Example.
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
21B16FC4CF1CA58890D1D9013662E63A
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88 0D 1D
Q.3 (a) Perform encryption and decryption using RSA algorithm with p=7,q=11,e=17
(b) Explain Needham-Schroeder protocol for secret key distribution with suitable
2E 3A 21 16 C CF 1C 5 89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A
63 21 B1 FC 4C 1C A5 889 0D D 01 66 E6 3A 1B 16 C4 CF CA 58
A2 B 6F 4 F1 A 88 0D 1D 90 36 2E 3A 21 1 FC C 1C 5 8
1B 16F C4 CF CA 58 90 1D 90 136 62E 63 21 B1 6FC 4C F1C A5 889
16 C4 CF 1C 58 890 D1 9 13 62 63 A2 B1 6F 4C F1 A 88
FC C 1C A5 89 D D9 01 66 E6 A 1B 6F C4 F CA 58 90
(05)
(05)
(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(05)
(05)
F1 A 88 90D 1D 901 36 2E 3A 21 16 FC CF 1C A5 89 D1
CA 58 90 1 90 36 62E 63 21 B1 FC 4C 1C A5 88 0D
58 890 D1 D90 136 62 63 A2 B1 6FC 4C F1C A5 88 90D 1D
89 D1 D9 13 62 E6 A2 1B 6F 4 F1 A 88 90 1D
0D D 01 66 E 3A 1B 16 C4 CF C 58 90 D1 9
Total Marks: 80
1D 901 36 2E 63A 21 16 FC CF 1C A5 89 D1 D9
90 36 62E 63 21 B1 FC 4C 1C A5 889 0D D9 01
13 62 63 A2 B1 6F 4C F1 A 88 0D 1D 01
66 E6 A 1B 6F C4 F CA 58 90 1 90 3
25-Nov-2019 1T01225 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base) / 32404 - Cryptography &
2E 3A 21 16 C CF 1C 5 89 D1 D9 13
63 21 B1 FC 4C 1C A5 889 0D D 01 6
A2 B 6F 4 F1 A 88 0D 1D 90 36
1B 16F C4 CF CA 58 90 1D 90 136 62
16 C4 CF 1C 58 890 D1 9 13 62
A 0