This action might not be possible to undo. Are you sure you want to continue?
) Packet filtering firewalls work at the ««««««« [ ] network layer [ ] application layer [ ] physical layer b.) An SSL «««««« is an association between two peers. [ ] session [ ] connection [ ] handshaking c.) PGP is«««««««««««««. [ ] a public key encryption package to protect e-mail and data files [ ] a security protocol to protect file [ ] an authentication mechanism that verifies the identity [ ] none d.) A «««««« virus infects either boot sectors or application. [ ] boot sector virus [ ] multipartite virus [ ] stealth virus e.) MD4 generates a message digest of ««««««. [ ] 128 bits [ ] 64 bits [ ] 256 bits f.) A/An «««««« is a cryptographic key associated with the communication [ ] session key [ ] communication key [ ] interchange key 2. Describe how Kerberos protocol provides authentication in a network? 3. Prove that the DES cipher satisfies the complementation property, i.e. decryption is same as encryption in DES. 4. Compare and contrast concept of virus and worms? How executable infecting virus works? 5. Suppose Alice wish to communicate with Bob. There is Cathy, a trusted third party, in between them. Alice & Cathy share a secret key, kA, and Bob & Cathy share a (different) secret key, kB. The goal is to provide a secret key, kSession that A and B share to
if message M= hi 8. (A) What is Firewall? What type of traffic are you denying at the firewall? Explain with Trojans monitoring techniques. What is the significance of dual signature in secure electronic transactions? 9. (B) What are the most important steps you would recommend for securing a new web server? Web application? . Compare (a) Preimage resistant and Second preimage resistant property of hash function (b) Active attacks and Passive attacks (c) Random numbers and Pseudorandom numbers 10. (Show full calculations) 11.(A) Explain Miller-Rabin algorithm for primality testing. what is B¶s public key YB? iii. If user B has private key XB = 8. 14. In RSA system. What is the ciphertext obtained? Finally decrypt the ciphertext to obtain the original message. what is A¶s public key YA? ii. The cipher text C.communicate securely. The private key d ii. Now write down the Classical Simple Protocol for key exchange between Alice and Bob. 12. (B) How do you compute modular multiplicative inverses? Find 3-1 mod 11? 13. If user A has private key XA = 6. i. What is the shared secret key?\ 7. 6. the public key of a given user is (3. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 11 and a primitive root g =2.(A) Briefly describe the IPSec framework for message authentication and encryption with key management protocol. (A) What is the difference between a block cipher and a stream cipher? (B) Construct a playfair matrix with the key LARGEST. (C) Encipher the message µACT¶ using the Hill cipher with key GYBNQKURP (3x3 matrix). (B) What is PGP? Explain how PGP helps to secure your e-mail. What is Avalanche effect? Explain CBC mode.55) what is i.
16. (A) Define Cross-Site Scripting (XSS). What do you see as challenges to successfully deploying/monitoring web intrusion detection? (B) Write down the features of Open Source Network Intrusion Detection System: SNORT with its associated rules.15. Write short notes on: (A) Message Integrity: Secure Hash Algorithm (SHA-1) (B) Substitution and Transposition Ciphers (C) Malicious Software (D) Secret Key Algorithm: DES (E) IPtables (F) SSL Handshake .