Be Computer Engineering Semester 6 2023 May Cryptography System Securityrev 2019 c Scheme
Be Computer Engineering Semester 6 2023 May Cryptography System Securityrev 2019 c Scheme
C
98
9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security
24
C3
87
C5
B8
D8
18
98
9F
D5
24
20
C3
87
C5
B8
D8
9E
18
98
D5
4
34
C3
7
2
2
88
B8
8
98
3D
Duration: 3hrs [Max Marks: 80]
01
79
AB
24
3 4
E2
C
88
D8
8
8
53
B
9
49
01
9
B
4
N.B. : (1) Question No 1 is Compulsory.
C3
87
9F
2
3
2
A
8
98
9E
18
C5
98
3
(2) Attempt any three questions out of the remaining five.
3D
5
87
9F
D5
(3) All questions carry equal marks.
83
2
A
C
E
8
5
8
53
B8
B9
49
01
C
9
(4) Assume suitable data, if required and state it clearly.
87
9F
5
83
2
24
A
D
18
5
3
B8
9
D8
9
C
9
5
AB
20
87
F
5
3
4
C3
9
D
1 Attempt any FOUR [20]
98
9E
2
18
C5
53
8
D8
98
AB
20
F
a Explain the relationship between Security Services and Mechanisms in detail.
3
24
3
87
59
D
9E
C
53
8
9
8
b Explain ECB and CBC modes of block cipher.
18
C
8
AB
3D
34
F
9
5
4
20
9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.
98
2
C
8
3
B8
8
9E
49
18
5
98
AB
3D
d Explain challenge response-based authentication tokens.
9F
5
83
4
34
87
8D
82
E2
C5
53
Explain buffer overflow attack.
B9
e
8
B
D
B9
49
01
9F
79
5
24
3A
3
D
3
2
3A
8C
88
C5
B8
D8
8
F5
B9
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9
[10]
01
79
F5
D5
24
4
59
3
public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A
C
88
59
8
8
8
9E
5C
8
B
3D
9
01
5C
9
F5
AB
What is the cipher text for M=10 using the public key.
4
4
8D
82
3
E2
8C
88
59
8D
8
3
4B
3D
9
49
1
5C
9
5
AB
87
F
82
3
E2
8C
9
8D
8
82
18
5
3D
B9
9
5C
79
5
4B
3D
20
F
8C
88
9
8D
9E
82
8C
C5
53
3.Role of S-box
9
01
79
4B
AB
3D
34
F
79
D5
88
9
98
82
8C
88
C5
3
B8
01
F5
34
01
79
D5
E2
24
3A
59
8
2
8C
88
B9
8
9E
49
5C
F5
B
3D
01
79
3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4
3A
59
8D
2
83
8C
88
B9
8
9E
[10]
5
B
3D
B9
01
F
79
D5
4
4
3A
59
2
83
2
3A
C
88
B8
8
9E
F5
8
3D
9
9
F5
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB
24
4
20
87
59
83
8C
B8
18
5C
53
3D
9
9
AB
24
4
20
8D
83
8C
88
59
8
9E
53
4B
3D
9
1
5C
79
AB
20
F
82
83
5 a [10]
9E
53
B8
3D
9
01
5C
79
φ(11)
AB
34
a.
F
E2
8C
88
59
D
8
53
φ(49)
B8
01
5C
b.
79
AB
4
F
E2
4
88
59
D
φ(240)
8
82
53
c.
B8
B9
01
5C
D
4
F
83
E2
4
A
C3
3
B8
B9
49
5C
5
98
83
4
3A
C3
9
D
82
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8
B9
C
5
8
F
79
D5
4
handshake protocol.
3A
C3
59
82
8
8
18
5C
F5
8
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20
C3
59
D
2
AH and ESP.
8
8
D8
9E
18
5C
8
4B
79
____________________________
20
8D
2
8C
8
D8
E
18
4B
49
9
20
3
87
82
3
8C
98
18
3D
49
9
AB
28998 Page 1 of 1
20
87
3
8C
98
18
53
49
79
AB
20
83
88
E
53
B9
53AB98349E20188798C3D824B8D5C59F
49
01