Professional Documents
Culture Documents
B5
8
4B
3D
79
9
Paper / Subject Code: 37472 / Cryptography and System Security
16
8C
82
8C
88
B5
4B
3D
01
79
9
16
8C
82
E2
8C
88
B5
4B
3D
49
79
Duration: 3hrs [Max Marks:80]
8C
2
83
E2
C
8
8
18
B
3D
B9
79
4
4
20
N.B. : (1) Question No 1 is Compulsory.
82
3
3A
8C
8
98
8
(2) Attempt any three questions out of the remaining five.
4B
3D
9
01
79
95
2
83
E2
A
(3) All questions carry equal marks.
8C
88
16
D8
3
01
B5
79
5
(4) Assume suitable data, if required and state it clearly.
C3
9
E2
3A
8
6
8C
98
8
51
98
9
01
95
4B
34
B
7
1 Attempt any FOUR [20]
E2
A
88
6
C
82
8
51
3
8
B9
01
9
5
B
3D
a Describe services and mechanisms.
4
B
87
9
4
83
E2
3A
16
C
2
8C
18
8
8
B9
49
B5
b ECB and CBC block cipher.
95
4B
3D
20
79
83
A
6
C
82
C
E
88
51
3
8
c Why digital signature and digital certificates are required?
B9
9
8
95
B
3D
01
4
B
9
83
3A
7
6
C
82
E2
8C
8
d What is keyed and keyless transposition ciphers?
1
8
9
8
9
B5
95
4B
3D
AB
49
34
79
0
16
8C
e Explain clickjacking and session hijacking.
82
83
98
C
88
53
9E
B5
8
B
D
B9
AB
1
9
4
34
20
C3
7
6
C
82
3A
53
8
98
B5
98
4B
3D
9
01
95
69
B
8C
2
3
E2
A
C
88
16
51
2. Need of expansion permutation
D8
8
8
3
B
9
01
B5
CB
9
95
24
4
3. Role of S-box
C3
87
3
E2
3A
6
8C
B8
D8
8
8
51
98
B9
1
5
4B
24
4
20
B
b Use the playfair cipher with the keyword “example” to encipher “The algorithm
C3
7
9
[10]
83
A
88
6
C
82
D8
9E
1
98
3
B9
01
5
5
B
3D
4
B
C3
87
9
4
83
E2
3A
6
8C
2
8C
18
1
98
8
B9
49
B5
95
B
3D
20
79
87
3 a What are properties of hash function? Compare MD-5 and SHA hash algorithm. [10]
4
83
A
16
8C
82
C
E
88
18
3
B9
9
B5
8
5
B
3D
01
20
79
83
3A
16
C
2
E2
8C
9E
8
8
8
9
18
B5
95
4B
D
AB
49
34
79
20
16
C
82
83
98
C
8
53
8
9E
4 a What do you understand by digital signatures and digital certificates? Explain digital
8
[10]
B
D
B9
AB
01
B
9
69
4
34
3
7
8C
88
53
B8
8
8
B5
3D
B9
b Explain memory and address protection in detail. Write a note on file protection. [10]
9
01
79
95
69
24
4
8C
3
E2
3A
C
88
51
D8
98
B
49
01
CB
9
95
24
C3
7
83
2
A
8
6
[10]
D8
E
8
51
98
3
B9
1
95
24
protocol.
4
0
B
3
87
83
E2
A
C
6
8C
D8
8
1
b Briefly explain database security. What do you understand by multilevel database [10]
8
3
B9
01
B5
9
95
4B
C3
87
security.
3
E2
A
6
8C
18
51
98
3
B9
9
5
B
20
B
87
9
4
3
A
6
C
2
18
1
9
B5
5
4B
20
9
3
C3
3A
16
C
9E
B8
D8
9
B5
98
95
AB
34
4
C3
b X.509
16
C
82
98
53
8
5
98
B
3D
AB
B
6
C
2
C
53
B8
D8
18
5
98
d DNS attack
CB
69
24
20
3
87
8C
51
8
D8
E
18
e Email attacks.
B
49
CB
79
4
20
C3
2
88
B8
_____________________________
D8
E
98
9
01
24
4
3
87
3
D8
98
9E
98
01
AB
34
29724 Page 1 of 1
C3
87
E2
98
18
98
53
49
AB
20
87
83
9E
18
53
B9
53AB98349E20188798C3D824B8CB5169
34
20