0% found this document useful (0 votes)
25 views

Be Computer Engineering Semester 6 2023 May Cryptography System Securityrev 2019 c Scheme

The document is an examination paper for the subject 'Cryptography & System Security' with a duration of 3 hours and a maximum of 80 marks. It contains various questions related to cryptographic concepts, including RSA algorithm, DES, digital signatures, and security protocols. Students are required to attempt specific questions, with certain questions being compulsory and all carrying equal marks.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Be Computer Engineering Semester 6 2023 May Cryptography System Securityrev 2019 c Scheme

The document is an examination paper for the subject 'Cryptography & System Security' with a duration of 3 hours and a maximum of 80 marks. It contains various questions related to cryptographic concepts, including RSA algorithm, DES, digital signatures, and security protocols. Students are required to attempt specific questions, with certain questions being compulsory and all carrying equal marks.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

D8

C
98

9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security

24
C3
87

C5
B8
D8
18

98

9F
D5
24
20

C3
87

C5
B8
D8
9E

18

98

D5
4
34

C3
7

2
2

88

B8
8
98

3D
Duration: 3hrs [Max Marks: 80]

01

79
AB

24
3 4

E2

C
88

D8
8

8
53

B
9

49

01

9
B

4
N.B. : (1) Question No 1 is Compulsory.

C3
87
9F

2
3

2
A

8
98

9E

18
C5

98
3
(2) Attempt any three questions out of the remaining five.

3D
5

87
9F
D5
(3) All questions carry equal marks.

83

2
A

C
E

8
5

8
53
B8

B9

49

01
C

9
(4) Assume suitable data, if required and state it clearly.

87
9F
5

83

2
24

A
D

18
5

3
B8

9
D8

9
C

9
5

AB

20

87
F
5

3
4
C3

9
D
1 Attempt any FOUR [20]

98

9E
2

18
C5

53
8
D8
98

AB

20
F
a Explain the relationship between Security Services and Mechanisms in detail.

3
24
3
87

59
D

9E
C

53
8

9
8
b Explain ECB and CBC modes of block cipher.
18

C
8

AB
3D

34
F
9

5
4
20

9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.

98
2
C
8

3
B8
8
9E

49
18

5
98

AB
3D
d Explain challenge response-based authentication tokens.

9F
5

83
4
34

87

8D
82
E2

C5

53
Explain buffer overflow attack.

B9
e
8

B
D
B9

49

01

9F
79

5
24

3A
3

D
3

2
3A

8C
88

C5
B8
D8
8

F5
B9

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9

[10]
01

79
F5

D5
24
4

59
3

public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A

C
88
59

8
8
8

9E

5C
8

B
3D
9

01
5C

9
F5

AB

What is the cipher text for M=10 using the public key.

4
4

8D
82
3

E2

8C
88
59
8D

8
3

4B
3D
9

49

1
5C

9
5

b Discuss DES with reference to following points [10]


4B

AB

87
F

82
3

E2

8C
9
8D

8
82

1. Block size and key size

18
5

3D
B9

9
5C

79
5
4B
3D

20
F

2.Need of expansion permutation


3
A

8C
88
9
8D

9E
82
8C

C5

53

3.Role of S-box
9

01

79
4B

AB
3D

34
F
79

D5

4.Weak keys and semi weak keys E2

88
9

98
82
8C
88

C5

3
B8

01
F5

5. Possible attacks on DES


B
3D

34
01

79

D5

E2
24

3A
59

8
2

8C
88

B9
8
9E

49
5C

F5
B
3D
01

79

3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4

3A
59
8D
2
83

8C
88

B9
8
9E

b What is DDOS attack? Explain how is it launched.


C

[10]
5
B
3D
B9

01

F
79

D5
4
4

3A
59
2
83

2
3A

C
88

B8
8
9E

F5
8

3D
9

9
F5

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB

24
4

20

87

59
83

8C

B8

in digital certificates? Explain any one digital signature algorithm.


8
9E

18

5C
53

3D
9

9
AB

24
4

20

b How does PGP achieve confidentiality and authentication in emails? [10]


7
F

8D
83

8C
88
59

8
9E
53

4B
3D
9

1
5C

79
AB

20
F

82
83

State the rules for finding Euler’s phi function. Calculate


8C
88
59
D

5 a [10]
9E
53
B8

3D
9

01
5C

79

φ(11)
AB

34

a.
F

E2

8C
88
59
D

8
53

φ(49)
B8

01
5C

b.
79
AB

4
F

E2
4

88
59
D

φ(240)
8
82

53

c.
B8

B9

01
5C
D

4
F

83

E2
4

A
C3

b Explain Kerberos. Why is it called as SSO? [10]


59
D
82

3
B8

B9

49
5C

5
98

83
4

3A
C3

9
D
82

6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8

B9
C

5
8

F
79

D5
4

handshake protocol.
3A
C3

59
82
8

8
18

5C

F5
8

b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20

C3

59
D
2

AH and ESP.
8

8
D8
9E

18

5C
8

4B
79

____________________________
20

8D
2
8C
8

D8
E

18

4B
49

9
20

3
87

82
3

8C
98

18

3D
49

9
AB

28998 Page 1 of 1
20

87
3

8C
98

18
53

49

79
AB

20
83

88
E
53

B9

53AB98349E20188798C3D824B8D5C59F
49

01

You might also like