Cryptography and System Security
Cryptography and System Security
(5M)
2. Explain key rings in PGP. (5M)
3. What are the different protocols in SSL? How do client and server establish SSl connection? (5M)
4. Explain TCP/IP vulnerabilities layer wise. (5M)
5. What is the purpose of S-boxes in DES? Explain the avalanche effect. (5M)
6. What is need for message authentication? List various techniques used for message
authentication. Explain any one.
7. What characteristics are needed in secure hash function? Explain secure hash algorithm on 512
bit.
8. Use Hill cipher to encrypt the text "short". The key to be used. is hill.
9. Explain man in middle attack on Diffie Hellman. Explain how to overcome the same.
10. Explain IPSec protocol in detail. Also write applications and advantages of IPSec.
11. What are different types of firewall? How firewall is different from IDS.
12. Explain Kerberos in detail.
13. Provide a comparison between HMAC, CBC-MAC and CMAC.
14. What is PKI? List its components.
15. What is digital certificate? How does it help to validate authenticity of a user. Explain X.509
certificate format.
16. Explain the relationship between Security Services and Mechanisms in detail. (5M)
17. Explain ECB and CBC modes of block cipher. (5M)
18. Define non-repudiation and authentication. Show with example how it can be achieved (5M)
19. Explain challenge response-based authentication tokens. (5M)
20. Explain buffer overflow attack. (5M)
21. Elaborate the steps of key generation using the RSA algorithm. In RSA system the public key
(E, N) of user A is defined as (7,187). Calculate (N) and private key 'D'. What is the cipher text
for M=10 using the public key. (Must Do)
22. Discuss DES with reference to following points 1. Block size and key size 2. Need of expansion
permutation 3. Role of S-box 4. keys and semi weak keys 5. Possible attacks on DES.
23. What goals are served using a message digest? Explain using MD5.
24. What is DDOS attack? Explain how is it launched.
25. Why are digital certificates and signatures required? What is the role of digital signature in
digital certificates? Explain any one digital signature algorithm.
26. How does PGP achieve confidentiality and authentication in emails?
27. State the rules for finding Euler's phi function. Calculate 1. φ(11) 2. φ(49) 3. φ(240)
28. Explain Kerberos. Why is it called as SSO?
29. Enlist the various functions of the different protocols of SSL. Explain the phases of handshake
protocol.
30. How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of AH and
ESP.