You are on page 1of 1

8

B5
8

4B
3D
79

9
Paper / Subject Code: 37472 / Cryptography and System Security

16
8C
82
8C
88

B5
4B
3D
01

79

9
16
8C
82
E2

8C
88

B5
4B
3D
49

79
Duration: 3hrs [Max Marks:80]

8C
2
83

E2

C
8

8
18

B
3D
B9

79

4
4

20
N.B. : (1) Question No 1 is Compulsory.

82
3
3A

8C
8
98

8
(2) Attempt any three questions out of the remaining five.

4B
3D
9

01

79
95

2
83

E2
A
(3) All questions carry equal marks.

8C
88
16

D8
3

01
B5

79
5
(4) Assume suitable data, if required and state it clearly.

C3
9

E2
3A

8
6
8C

98

8
51

98
9

01
95
4B

34
B

7
1 Attempt any FOUR [20]

E2
A

88
6
C
82

8
51

3
8

B9

01

9
5
B
3D
a Describe services and mechanisms.

4
B

87
9
4

83

E2
3A
16
C
2
8C

18
8
8

B9

49
B5
b ECB and CBC block cipher.

95
4B
3D

20
79

83
A
6
C
82
C

E
88

51

3
8
c Why digital signature and digital certificates are required?

B9

9
8

95
B
3D
01

4
B
9

83
3A
7

6
C
82
E2

8C
8
d What is keyed and keyless transposition ciphers?

1
8

9
8

9
B5

95
4B
3D

AB
49

34
79
0

16
8C
e Explain clickjacking and session hijacking.

82
83

98
C
88

53
9E

B5
8

B
D
B9

AB
1

9
4
34

20

C3
7

6
C
82
3A

2 a Explain DES algorithm with reference to following points: 88 [10]

53
8
98

B5
98

4B
3D
9

01
95

1. Block size and key size

69
B

8C
2
3

E2
A

C
88
16

51
2. Need of expansion permutation

D8
8

8
3

B
9

01
B5

CB
9
95

24
4

3. Role of S-box

C3
87
3

E2
3A
6
8C

B8
D8
8

8
51

4. Possible attacks on DES

98
B9

1
5
4B

24
4

20
B

b Use the playfair cipher with the keyword “example” to encipher “The algorithm

C3
7
9

[10]
83
A

88
6
C
82

D8
9E
1

98
3

name is playfair cipher”


8

B9

01
5

5
B
3D

4
B

C3
87
9
4

83

E2
3A
6
8C
2
8C

18
1

98
8

B9

49
B5

95
B
3D

20
79

87
3 a What are properties of hash function? Compare MD-5 and SHA hash algorithm. [10]
4

83
A
16
8C
82
C

E
88

18
3

B9

9
B5
8

5
B
3D
01

20
79

b Explain Diffie hellman key exchange algorithm. [10]


4

83
3A
16
C
2
E2

8C

9E
8

8
8

9
18

B5

95
4B
D

AB
49

34
79
20

16
C
82
83

98
C
8

53
8
9E

4 a What do you understand by digital signatures and digital certificates? Explain digital
8

[10]
B
D
B9

AB
01

B
9

69
4
34

3
7

signature scheme RSA.


2
2
3A

8C
88

53
B8
8
8

B5
3D
B9

b Explain memory and address protection in detail. Write a note on file protection. [10]
9

01

79
95

69
24
4

8C
3

E2
3A

C
88

51
D8
98

B
49

01

CB
9
95

24
C3
7
83

2
A

8
6

5 a Enlist various functions of protocols of SSL. Explain the phases of handshake


B8

[10]
D8
E

8
51

98
3

B9

1
95

24

protocol.
4

0
B

3
87
83

E2
A

C
6
8C

D8
8
1

b Briefly explain database security. What do you understand by multilevel database [10]
8
3

B9

01
B5

9
95
4B

C3
87

security.
3

E2
A
6
8C

18
51

98
3

B9

9
5
B

20
B

87
9
4

3
A
6
C
2

18
1

6 Write short notes on any four: [20]


3
8
D8

9
B5

5
4B

20
9

3
C3

3A
16
C

a Web browser attacks


2

9E
B8
D8

9
B5
98

95

AB

34
4
C3

b X.509
16
C
82

98
53
8

5
98

B
3D

AB
B

c Cross site request forgery


4
87

6
C
2
C

53
B8
D8
18

5
98

d DNS attack
CB

69
24
20

3
87

8C

51
8
D8
E

18

e Email attacks.
B
49

CB
79

4
20

C3

2
88

B8

_____________________________
D8
E

98
9

01

24
4

3
87
3

D8
98

9E

98
01
AB

34

29724 Page 1 of 1
C3
87
E2
98

18

98
53

49
AB

20

87
83

9E

18
53

B9

53AB98349E20188798C3D824B8CB5169
34

20

You might also like