Professional Documents
Culture Documents
3) In PGP operation the session key is encrypted using ________ public key
algorithm.
Virus pseudocode
infect( );
if ________( )
then _______( );
1 TLS / SSL
2 APPLICATION
3 IP
4 TCP
Q1 (B) Attempt any FIVE questions out of the following (attempt any 5 out of 7) 10
Class: TY B. Tech
Branch: Comp. Engg. Semester : VI
Full name of the course: Cryptography and System Security Course Code: 2UCC602
Duration: 1hr.15 min (attempting questions) +15 min (uploading) Max. Marks: 30
Q. Questions Marks
No
Q1 1.1 A security ___________ makes use of one or more security
___________
a. Service, Mechanisms
b.Goal, mechanisms
c. Mechanism, services
d.Mechanism, goals
1.7 In DES algorithm the block size = ____ and key size = _____
1.8 In AES algorithm the block size = _____ and key size = ______
(all variants)
Q2 Discuss various methods of defense giving at least one example for 10 marks
each method.
OR
A) Discuss DES algorithm analysis with respect to its strengths and 5 marks
weaknesses.
B) You have video file with size 100 MB, Illustrate how will you send
it securely using DES algorithm. 5 marks
OR
(a)Explain with diagram the process of using message authentication
code.(03)
(b)Can attacker alter the MAC? Yes or No? Give justification.(01)
(c)Is Mac algorithm similar to encryption and decryption process?
Justify.(02)
(d)Is it possible to use MD5 and SHA1 algorithms for calculating a MAC?
Justify.(02)
(e) List two limitations of MAC. Also state solution to the limitation.(02)
OR
(a)Explain salami attack with example(05)
(b)Explain Incomplete mediation with example.(05)