0% found this document useful (0 votes)
59 views1 page

Gujarat Technological University: Instructions

This document is an exam for the subject "Security in Wireless and Mobile Systems". It contains 7 questions assessing students' knowledge of key concepts in cryptography and security for wireless networks. The questions cover topics such as symmetric and asymmetric key algorithms, cryptosystem components and strength, digital signatures, hash functions, manet security challenges and attacks. Students are instructed to attempt all questions, make assumptions where needed, and note that figure to the right of each question indicate the full marks for that question.

Uploaded by

Jainesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views1 page

Gujarat Technological University: Instructions

This document is an exam for the subject "Security in Wireless and Mobile Systems". It contains 7 questions assessing students' knowledge of key concepts in cryptography and security for wireless networks. The questions cover topics such as symmetric and asymmetric key algorithms, cryptosystem components and strength, digital signatures, hash functions, manet security challenges and attacks. Students are instructed to attempt all questions, make assumptions where needed, and note that figure to the right of each question indicate the full marks for that question.

Uploaded by

Jainesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Seat No.: ________ Enrolment No.

___________
GUJARAT TECHNOLOGICAL UNIVERSITY
M. E. - SEMESTER – III • EXAMINATION – WINTER • 2013
Subject code: 735302 Date: 26-11-2013
Subject Name: Security in Wireless and Mobile Systems
Time: 10.30 am – 01.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

Q.1 (a) i. Define CIA triad. [2]


ii. Define Digital Signature. [2]
iii. Explain insider and outsider threat in MANET. [2]
iv. Explain threat and vulnerability. [2]
v. What is digital certificate? [2]
vi. Explain running key cipher. [2]
vii. Explain Transposition cipher. [2]

Q.2 (a) Explain Symmetric Key Algorithm and Asymmetric Key Algorithm with an [7]
example.
(b) Explain any 3 types of attack on cryptosystem with suitable examples. [7]

Q.3 (a) What are DEA and DES? Explain the working of DES. [7]
(b) Explain the different modes of 3DES. [7]

Q.4 (a) What is Message Authentication Code? Explain in details. [7]


(b) Explain hashing in detail. Differentiate between SHA1 and MD5 algorithm. [7]

Q.5 (a) What is MANET? Discuss their Characteristics. What are the security [7]
challenges in MANET?
(b) List out routing attacks against MANET. Explain any two in details. [7]

Q.6 (a) i. What is Cryptosystem? What are its components? [4]


ii. What is work factor in cryptography? [3]
(b) What do you mean by strength of cryptosystem? Explain the concepts in detail. [7]

Q.7 (a) Write Short notes on the following


i. DoS attack and its consequences in MANET. [4]
ii. Digital Signature. [3]
.
(b) Explain active attack and passive attack in detail with relevant examples. [7]

************

You might also like