0% found this document useful (0 votes)
24 views8 pages

CSS MU QPapers 2019-2023

Uploaded by

Mark
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

CSS MU QPapers 2019-2023

Uploaded by

Mark
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

D8

C
98

9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security

24
C3
87

C5
B8
D8
18

98

9F
D5
24
20

C3
87

C5
B8
D8
9E

18

98

D5
4
34

C3
7

2
2

88

B8
8
98

3D
Duration: 3hrs [Max Marks: 80]

01

79
AB

24
3 4

E2

C
88

D8
8

8
53

B
9

49

01

9
B

4
N.B. : (1) Question No 1 is Compulsory.

C3
87
9F

2
3

2
A

8
98

9E

18
C5

98
3
(2) Attempt any three questions out of the remaining five.

3D
5

87
9F
D5
(3) All questions carry equal marks.

83

2
A

C
E

8
5

8
53
B8

B9

49

01
C

9
(4) Assume suitable data, if required and state it clearly.

87
9F
5

83

2
24

A
D

18
5

3
B8

9
D8

9
C

9
5

AB

20

87
F
5

3
4
C3

9
D
1 Attempt any FOUR [20]

98

9E
2

18
C5

53
8
D8
98

AB

20
F
a Explain the relationship between Security Services and Mechanisms in detail.

3
24
3
87

59
D

9E
C

53
8

9
8
b Explain ECB and CBC modes of block cipher.
18

C
8

AB
3D

34
F
9

5
4
20

9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.

98
2
C
8

3
B8
8
9E

49
18

5
98

AB
3D
d Explain challenge response-based authentication tokens.

9F
5

83
4
34

87

8D
82
E2

C5

53
Explain buffer overflow attack.

B9
e
8

B
D
B9

49

01

9F
79

5
24

3A
3

D
3

2
3A

8C
88

C5
B8
D8
8

F5
B9

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9

[10]
01

79
F5

D5
24
4

59
3

public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A

C
88
59

8
8
8

9E

5C
8

B
3D
9

01
5C

9
F5

AB

What is the cipher text for M=10 using the public key.

4
4

8D
82
3

E2

8C
88
59
8D

8
3

4B
3D
9

49

1
5C

9
5

b Discuss DES with reference to following points [10]


4B

AB

87
F

82
3

E2

8C
9
8D

8
82

1. Block size and key size

18
5

3D
B9

9
5C

79
5
4B
3D

20
F

2.Need of expansion permutation


3
A

8C
88
9
8D

9E
82
8C

C5

53

3.Role of S-box
9

01

79
4B

AB
3D

34
F
79

D5

4.Weak keys and semi weak keys E2

88
9

98
82
8C
88

C5

3
B8

01
F5

5. Possible attacks on DES


B
3D

34
01

79

D5

E2
24

3A
59

8
2

8C
88

B9
8
9E

49
5C

F5
B
3D
01

79

3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4

3A
59
8D
2
83

8C
88

B9
8
9E

b What is DDOS attack? Explain how is it launched.


C

[10]
5
B
3D
B9

01

F
79

D5
4
4

3A
59
2
83

2
3A

C
88

B8
8
9E

F5
8

3D
9

9
F5

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB

24
4

20

87

59
83

8C

B8

in digital certificates? Explain any one digital signature algorithm.


8
9E

18

5C
53

3D
9

9
AB

24
4

20

b How does PGP achieve confidentiality and authentication in emails? [10]


7
F

8D
83

8C
88
59

8
9E
53

4B
3D
9

1
5C

79
AB

20
F

82
83

State the rules for finding Euler’s phi function. Calculate


8C
88
59
D

5 a [10]
9E
53
B8

3D
9

01
5C

79

φ(11)
AB

34

a.
F

E2

8C
88
59
D

8
53

φ(49)
B8

01
5C

b.
79
AB

4
F

E2
4

88
59
D

φ(240)
8
82

53

c.
B8

B9

01
5C
D

4
F

83

E2
4

A
C3

b Explain Kerberos. Why is it called as SSO? [10]


59
D
82

3
B8

B9

49
5C

5
98

83
4

3A
C3

9
D
82

6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8

B9
C

5
8

F
79

D5
4

handshake protocol.
3A
C3

59
82
8

8
18

5C

F5
8

b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20

C3

59
D
2

AH and ESP.
8

8
D8
9E

18

5C
8

4B
79

____________________________
20

8D
2
8C
8

D8
E

18

4B
49

9
20

3
87

82
3

8C
98

18

3D
49

9
AB

28998 Page 1 of 1
20

87
3

8C
98

18
53

49

79
AB

20
83

88
E
53

B9

53AB98349E20188798C3D824B8D5C59F
49

01
90 F 6 E E 25 A A BE D
90 CFB B6C C7E CE5 525 AA 0A0 0BE 9D BF3
CF 6 7E CE 25 AA 0A B 9D BF 02
CF B6 C7E CE 525 AA 0A 0B E9D BF 302 8E
C 5 0 E 3 8 6
FB B6C 7EC CE5 25AAA0 0A0 BE9 9DB BF3 028 E65 590C
6 7 E 2 A B D F 0 E
B6 C7 ECE 52 5AAA0A 0B E9D BF 30 28E 659 90C FB6
C7 EC 52 5A 0A 0B E9 B 30 28E 65 0C FB C7
6C EC E5 5A A0 0 E DB F3 28 6 90 FB 6C E
7E E 2 A A B 9D F 02 E 59 CF 6 7 CE

N.B

Q.1
7E CE 525 5AA 0A 0BE E9D BF 302 8E6 6590 0CF B6C C7E ECE 525
5 0 3 8 5
EC CE5 25AAA0 0A0 BE9 9DB BF3 028 E65 590C CFB B6C 7EC CE5 25AAA0
E 2 5 A A B E D F 0 2 E 6 9 0 F 6 C 7 E E 2 A
3

68095
CE 525 AA 0A 0B 9D BF 02 8E 59 CF B6 7E CE 52 5AAA0A 0B
5 2 A 0 0 B E9 B 30 8E 65 0C B C7 C 5 5A 0 0B E9
2
E5 5A A0 A0 E DB F3 28 65 90 FB 6C EC E5 5A A0 A0 E DB
2 B 9 0 E C 7 B 9
52 5AAA0AA0B E9DDBF F30 28E 659 90C FB6 6C7 ECE E52 25A A0AA0B E9DDBF F30
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28

same.
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90
BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA 0A BE 9D BF 02 E6 590 CF
9D BF 302 8E6 59 CF B6 7E CE 525 AA 0A 0BE 9D BF 302 8E 59 CF B6
BF 302 8E 59 0CF B6 C7 CE 52 AA 0A 0B 9D BF 30 8E 659 0C B6 C7
30 8E 659 0C B6 C7 EC 52 5A 0A 0B E9 B 30 28E 659 0C FB C7 EC
28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25

iii. Expansion
Answer any Four
59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0

is full of Surprises”
v. DES function
FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC E5 5A A0 A0
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E5 25 A A0 BE
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE 25 AA 0A BE 9D
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF

Q. 6 a) Explain Kerberos in detail


52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52 5A 0A 0B E9D BF 30

c) Explain key rings in PGP?


5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28

iv. Significance of S-box


1) Question no 1 is compulsory

A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65

b) Explain structure of DES wrt:


A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90

i. Calculate A’s Private key.


BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA 0A BE 9D BF 02 E6 590 CF

ii. Calculate B’s Private Key.


3) Assume suitable data if required

9D BF 302 8E6 59 CF B6 7E CE 525 AA 0A 0BE 9D BF 302 8E 59 CF B6

“The house is being sold tonight”.


BF 302 8E 59 0CF B6 C7 CE 52 AA 0A 0B 9D BF 30 8E 659 0C B6 C7
30 8E 659 0C B6 C7 EC 52 5A 0A 0B E9 B 30 28E 659 0C FB C7 EC
(3 hours)

28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25
4) Draw neat diagram wherever necessary

59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0

i. Fiestel structure and its significance


FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC E5 5A A0 A0
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E5 25 A A0 BE
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE 25 AA 0A BE 9D

------x-----
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF
x≡2 (mod 3), x≡3 (mod 5), x≡2(mod 7), Find x?

52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52 5A 0A 0B E9D BF 30


5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65 (7, 247) and B chooses public key (e, n) as (5, 221)
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90
BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA 0A BE 9D BF 02 E6 590 CF
e) Using Chinese remainder theorem solve the following:

9D BF 302 8E6 59 CF B6 7E CE 525 AA 0A 0BE 9D BF 302 8E 59 CF B6


BF 302 8E 59 0CF B6 C7 CE 52 AA 0A 0B 9D BF 30 8E 659 0C B6 C7
a) Why digital signature and digital certificates are required?

30 8E 659 0C B6 C7 EC 52 5A 0A 0B E9 B 30 28E 659 0C FB C7 EC


2) Attempt any three questions from remaining five questions

F3028E6590CFB6C7ECE525AA0A0BE9DB
Q.4 a) What is the need of SSL? Explain SSL Handshake Protocol
28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25
b) Explain with example keyed and keyless transposition cipher

59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0
FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC E5 5A A0 A0
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E5 25 A A0 BE

ii. Significance of extra swap between left and right half blocks
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE 25 AA 0A BE 9D
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF
52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52 5A 0A 0B E9D BF 30
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28

b) What are different types of firewall? How firewall is different than IDS?
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90
Paper / Subject Code: 88904 / Cryptography and System Security

BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA 0A BE 9D BF 02 E6 590 CF


b) What is meant by DOS Attack? What are different ways mount DOS attacks?

9D BF 302 8E6 59 CF B6 7E CE 525 AA 0A 0BE 9D BF 302 8E 59 CF B6

b) Encrypt the given message using Autokey Cipher, Key=7 and the Message is:
d) What are properties of hash function? Explain role of hash function in security

iii. What will be the cipher text sent by A to B, if A wishes to send M=5 to B

BF 302 8E 59 0CF B6 C7 CE 52 AA 0A 0B 9D BF 30 8E 659 0C B6


Q.3 a) How does ESP header guarantee confidentiality and integrity of packet payload?

30 8E 659 0C B6 C7 EC 52 5A 0A 0B E9 B 30 28E 659 0C FB C


28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E
59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC
FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E

Page 1 of 1
Total marks: 80

7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE

(10)
(10)
b) Use the playfair cipher with the keyword: “HEALTH” to encipher the message “Life (10)
Q.5 a) Explain man in the middle attack on Diffie Hellman . Explain how to overcome the (10)
(10)
(10)
(10)
(10)
(10)
Q.2 a) If A and B wish to use RSA to communicate securely. A chooses public key (e, n) as (10)
(05)
(05)
(05)
(05)
(05)

CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 5
52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25
BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA
9D BF 302 8E6 59 CF B6 7E CE 525 AA
BF 302 8E 59 0CF B6 C7 CE 52 AA 0
30 8E 65 0C B C7 EC 52 5A 0
98 6 A6 E A A E 8A D B
98 F63 3A6 EE2 2ADDA0 0FE5 58A 2D 6BC C0C
F A E A A F 8 2 6B 0 2
F6 63A6 6EE E2A DA 0FE E58AA2DD6B C0 C2DD77
3 D 0 C 7
63 A6E EE2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098
A6 E AD A FE 8A 2D B 0C 2D 77 09 F6
3A E 2A A 0F 58 2 6B C0 2 77 0 8F 3A
6E E2 D 0 E5 A D6 C C D7 7 98 63 6
6E E2AADAA0F FE5 8A2 2D6 BC 0C2 2D7 770 098F F63AA6E EE2
8 B 0 7 A
EE E2A DA 0FE E58 A2DD6B C0 C2DD77 709 98F6 63A 6EE E2A DA
D 0 A C 7 8 6 D

Q. 6
E2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098 F63 3A6 EE2 2AD A0 0FE5
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A

68093
2A A F 58 2 6B C0 2 77 09 F 3A E 2A A 0F 58 2
D 0F E5 A D6 C C D7 70 8 63 6E E2 D 0 E5 A D6
DAA0F E58 8A2 2D6 BC0 0C2 2D7 770 98F F63AA6E E2AADAA0F FE5 8A2 2D6 BC
E D B D 7 9 6 E E 8 D B 0
A0 0FE 58AA2D 6BC C0C C2D 777 7098 8F6 3A6 6EE 2ADDA0 0FE 58AA2D 6B C0C C2D

detail.
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63

e. IDS
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE

c. 3DES
d. X.509
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA

a. Kerberos
launch an attack.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC

b. Buffer Overflow
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
N. B: 1. Question No. 1 is Compulsory.

A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F

Write short notes on any FOUR:


D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
[3 Hours]

77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA


70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
2. Solve any THREE from Question No. 2 to 6.

6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6

------x-----
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Q.1 a) Enlist security goals. Discuss their significance.

pair (3, 7). Decrypt to get back original plaintext.

A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D

b) Discuss in detail block cipher modes of operation.


FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77

cipher with example. List their merits and demerits.


b) Explain different types of Denial of Service attacks.

58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709


A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
3. Draw neat well labeled diagram wherever necessary.

D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
what is B’s public key R2? What is the shared secret key?
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A

0C2D777098F63A6EE2ADA0FE58A2D6BC
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA

message signing and verification using RSA digital signature.


70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77

and SHA Hash functions. State real world applications of hash functions.
d) List various Software Vulnerabilities. How vulnerabilities are exploited to

Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221).

58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709

Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in
Paper / Subject Code: 88904 / Cryptography and System Security

Calculate their private keys. A wishes to send message m=5 to B. Show the

A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
b) What are traditional ciphers? Discuss any one substitution and transposition
private key x=5, what is A’s Public Key R1? If user B has private key y=12,

D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key

BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A


Q.3 a) Users A and B use the Diffie-Hellman key exchange technique with a common

b) What are the requirements of the cryptographic hash functions? Compare MD5
c) What is authentication header(AH)? How does it protect against replay attacks?

prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has

0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6


b) Compare AES and DES. Which one is bit oriented? Which one is byte oriented?

2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6E
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2
(05)
(05)
(05)
(05)

(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)

3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A

Page 1 of 1
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2
[Total Marks 80]

E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0
A2 6 C C2 7 70 8F 3A 6E 2 D 0F
D6 BC 0C D7 770 98 63 6E E2 AD A0
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE
0C 2D 777 098 F63 A6 EE AD A0 FE
7 0 E 2 5

You might also like