CSS MU QPapers 2019-2023
CSS MU QPapers 2019-2023
C
98
9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security
24
C3
87
C5
B8
D8
18
98
9F
D5
24
20
C3
87
C5
B8
D8
9E
18
98
D5
4
34
C3
7
2
2
88
B8
8
98
3D
Duration: 3hrs [Max Marks: 80]
01
79
AB
24
3 4
E2
C
88
D8
8
8
53
B
9
49
01
9
B
4
N.B. : (1) Question No 1 is Compulsory.
C3
87
9F
2
3
2
A
8
98
9E
18
C5
98
3
(2) Attempt any three questions out of the remaining five.
3D
5
87
9F
D5
(3) All questions carry equal marks.
83
2
A
C
E
8
5
8
53
B8
B9
49
01
C
9
(4) Assume suitable data, if required and state it clearly.
87
9F
5
83
2
24
A
D
18
5
3
B8
9
D8
9
C
9
5
AB
20
87
F
5
3
4
C3
9
D
1 Attempt any FOUR [20]
98
9E
2
18
C5
53
8
D8
98
AB
20
F
a Explain the relationship between Security Services and Mechanisms in detail.
3
24
3
87
59
D
9E
C
53
8
9
8
b Explain ECB and CBC modes of block cipher.
18
C
8
AB
3D
34
F
9
5
4
20
9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.
98
2
C
8
3
B8
8
9E
49
18
5
98
AB
3D
d Explain challenge response-based authentication tokens.
9F
5
83
4
34
87
8D
82
E2
C5
53
Explain buffer overflow attack.
B9
e
8
B
D
B9
49
01
9F
79
5
24
3A
3
D
3
2
3A
8C
88
C5
B8
D8
8
F5
B9
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9
[10]
01
79
F5
D5
24
4
59
3
public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A
C
88
59
8
8
8
9E
5C
8
B
3D
9
01
5C
9
F5
AB
What is the cipher text for M=10 using the public key.
4
4
8D
82
3
E2
8C
88
59
8D
8
3
4B
3D
9
49
1
5C
9
5
AB
87
F
82
3
E2
8C
9
8D
8
82
18
5
3D
B9
9
5C
79
5
4B
3D
20
F
8C
88
9
8D
9E
82
8C
C5
53
3.Role of S-box
9
01
79
4B
AB
3D
34
F
79
D5
88
9
98
82
8C
88
C5
3
B8
01
F5
34
01
79
D5
E2
24
3A
59
8
2
8C
88
B9
8
9E
49
5C
F5
B
3D
01
79
3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4
3A
59
8D
2
83
8C
88
B9
8
9E
[10]
5
B
3D
B9
01
F
79
D5
4
4
3A
59
2
83
2
3A
C
88
B8
8
9E
F5
8
3D
9
9
F5
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB
24
4
20
87
59
83
8C
B8
18
5C
53
3D
9
9
AB
24
4
20
8D
83
8C
88
59
8
9E
53
4B
3D
9
1
5C
79
AB
20
F
82
83
5 a [10]
9E
53
B8
3D
9
01
5C
79
φ(11)
AB
34
a.
F
E2
8C
88
59
D
8
53
φ(49)
B8
01
5C
b.
79
AB
4
F
E2
4
88
59
D
φ(240)
8
82
53
c.
B8
B9
01
5C
D
4
F
83
E2
4
A
C3
3
B8
B9
49
5C
5
98
83
4
3A
C3
9
D
82
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8
B9
C
5
8
F
79
D5
4
handshake protocol.
3A
C3
59
82
8
8
18
5C
F5
8
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20
C3
59
D
2
AH and ESP.
8
8
D8
9E
18
5C
8
4B
79
____________________________
20
8D
2
8C
8
D8
E
18
4B
49
9
20
3
87
82
3
8C
98
18
3D
49
9
AB
28998 Page 1 of 1
20
87
3
8C
98
18
53
49
79
AB
20
83
88
E
53
B9
53AB98349E20188798C3D824B8D5C59F
49
01
90 F 6 E E 25 A A BE D
90 CFB B6C C7E CE5 525 AA 0A0 0BE 9D BF3
CF 6 7E CE 25 AA 0A B 9D BF 02
CF B6 C7E CE 525 AA 0A 0B E9D BF 302 8E
C 5 0 E 3 8 6
FB B6C 7EC CE5 25AAA0 0A0 BE9 9DB BF3 028 E65 590C
6 7 E 2 A B D F 0 E
B6 C7 ECE 52 5AAA0A 0B E9D BF 30 28E 659 90C FB6
C7 EC 52 5A 0A 0B E9 B 30 28E 65 0C FB C7
6C EC E5 5A A0 0 E DB F3 28 6 90 FB 6C E
7E E 2 A A B 9D F 02 E 59 CF 6 7 CE
N.B
Q.1
7E CE 525 5AA 0A 0BE E9D BF 302 8E6 6590 0CF B6C C7E ECE 525
5 0 3 8 5
EC CE5 25AAA0 0A0 BE9 9DB BF3 028 E65 590C CFB B6C 7EC CE5 25AAA0
E 2 5 A A B E D F 0 2 E 6 9 0 F 6 C 7 E E 2 A
3
68095
CE 525 AA 0A 0B 9D BF 02 8E 59 CF B6 7E CE 52 5AAA0A 0B
5 2 A 0 0 B E9 B 30 8E 65 0C B C7 C 5 5A 0 0B E9
2
E5 5A A0 A0 E DB F3 28 65 90 FB 6C EC E5 5A A0 A0 E DB
2 B 9 0 E C 7 B 9
52 5AAA0AA0B E9DDBF F30 28E 659 90C FB6 6C7 ECE E52 25A A0AA0B E9DDBF F30
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28
same.
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90
BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA 0A BE 9D BF 02 E6 590 CF
9D BF 302 8E6 59 CF B6 7E CE 525 AA 0A 0BE 9D BF 302 8E 59 CF B6
BF 302 8E 59 0CF B6 C7 CE 52 AA 0A 0B 9D BF 30 8E 659 0C B6 C7
30 8E 659 0C B6 C7 EC 52 5A 0A 0B E9 B 30 28E 659 0C FB C7 EC
28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25
iii. Expansion
Answer any Four
59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0
is full of Surprises”
v. DES function
FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC E5 5A A0 A0
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E5 25 A A0 BE
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE 25 AA 0A BE 9D
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF
28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25
4) Draw neat diagram wherever necessary
59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0
------x-----
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF
x≡2 (mod 3), x≡3 (mod 5), x≡2(mod 7), Find x?
F3028E6590CFB6C7ECE525AA0A0BE9DB
Q.4 a) What is the need of SSL? Explain SSL Handshake Protocol
28 65 0C FB C EC E5 5A A0 0 E9 DB F3 28 65 0C FB 6C EC E5
E6 90 F 6C 7E E 25 A A BE D F 02 E6 90 F 6C 7E E 25
b) Explain with example keyed and keyless transposition cipher
59 CF B6 7E CE 52 AA 0A 0B 9D BF 302 8E 59 CF B6 7 CE 52 AA
0C B C7 C 52 5A 0 0B E9 B 30 8E 65 0C B C7 EC 52 5A 0
FB 6C EC E5 5A A0 A0 E9 DB F3 28 65 90C FB 6C EC E5 5A A0 A0
6C 7EC E5 25A A0 A0 BE DB F3 028 E6 90 FB 6C 7E E5 25 A A0 BE
ii. Significance of extra swap between left and right half blocks
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE 25 AA 0A BE 9D
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 52 AA 0A 0B 9D BF
52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52 5A 0A 0B E9D BF 30
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5A A0 0 E9 B 3 28
b) What are different types of firewall? How firewall is different than IDS?
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A A0 A0 BE DB F3 028 E65
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25 A A0 BE 9D F3 028 E6 90
Paper / Subject Code: 88904 / Cryptography and System Security
b) Encrypt the given message using Autokey Cipher, Key=7 and the Message is:
d) What are properties of hash function? Explain role of hash function in security
iii. What will be the cipher text sent by A to B, if A wishes to send M=5 to B
Page 1 of 1
Total marks: 80
7E E 25 A A BE 9D F 02 E6 590 CF 6C 7E CE
(10)
(10)
b) Use the playfair cipher with the keyword: “HEALTH” to encipher the message “Life (10)
Q.5 a) Explain man in the middle attack on Diffie Hellman . Explain how to overcome the (10)
(10)
(10)
(10)
(10)
(10)
Q.2 a) If A and B wish to use RSA to communicate securely. A chooses public key (e, n) as (10)
(05)
(05)
(05)
(05)
(05)
CE 525 AA 0A 0B 9D BF 302 8E 59 CF B6 7E CE 5
52 AA 0A 0B E9D BF 30 8E 659 0C B6 C7 CE 52
5A 0 0B E9 B 30 28 65 0C FB C EC 5 5
A0 A0 E DB F3 28 E65 90 FB 6C 7EC E5 25A
A0 BE 9D F3 028 E6 90 CF 6C 7E E5 25
BE 9D BF 02 E6 590 CF B6C 7E CE 25 AA
9D BF 302 8E6 59 CF B6 7E CE 525 AA
BF 302 8E 59 0CF B6 C7 CE 52 AA 0
30 8E 65 0C B C7 EC 52 5A 0
98 6 A6 E A A E 8A D B
98 F63 3A6 EE2 2ADDA0 0FE5 58A 2D 6BC C0C
F A E A A F 8 2 6B 0 2
F6 63A6 6EE E2A DA 0FE E58AA2DD6B C0 C2DD77
3 D 0 C 7
63 A6E EE2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098
A6 E AD A FE 8A 2D B 0C 2D 77 09 F6
3A E 2A A 0F 58 2 6B C0 2 77 0 8F 3A
6E E2 D 0 E5 A D6 C C D7 7 98 63 6
6E E2AADAA0F FE5 8A2 2D6 BC 0C2 2D7 770 098F F63AA6E EE2
8 B 0 7 A
EE E2A DA 0FE E58 A2DD6B C0 C2DD77 709 98F6 63A 6EE E2A DA
D 0 A C 7 8 6 D
Q. 6
E2 2AD A0 FE5 58A 2D6 6BC C0C 2D7 777 098 F63 3A6 EE2 2AD A0 0FE5
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A
68093
2A A F 58 2 6B C0 2 77 09 F 3A E 2A A 0F 58 2
D 0F E5 A D6 C C D7 70 8 63 6E E2 D 0 E5 A D6
DAA0F E58 8A2 2D6 BC0 0C2 2D7 770 98F F63AA6E E2AADAA0F FE5 8A2 2D6 BC
E D B D 7 9 6 E E 8 D B 0
A0 0FE 58AA2D 6BC C0C C2D 777 7098 8F6 3A6 6EE 2ADDA0 0FE 58AA2D 6B C0C C2D
detail.
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
e. IDS
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
c. 3DES
d. X.509
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA
a. Kerberos
launch an attack.
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E 2 D 0F
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E AD A0 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2A A FE 58
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A DA 0F 58 A2
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2 D 0F E5 A2 D6
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
b. Buffer Overflow
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A FE 58 2D 6B C0 2D 77
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0F 58 A2 6B C0 C2 77 709
N. B: 1. Question No. 1 is Compulsory.
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
------x-----
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD A0 E5 8A D BC
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD A FE 8A 2D 6B 0C
Q.1 a) Enlist security goals. Discuss their significance.
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A0 0FE 58A 2D 6B C0C 2D
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE 8A 2D BC 0C 2D 77 098 F63 A6
what is B’s public key R2? What is the shared secret key?
0C 2D 777 098 F63 A6 EE AD A0 FE 58A 2D 6BC 0C 2D 777 098 F6 A6 EE
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A EE 2A
0C2D777098F63A6EE2ADA0FE58A2D6BC
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6EE 2A DA
and SHA Hash functions. State real world applications of hash functions.
d) List various Software Vulnerabilities. How vulnerabilities are exploited to
Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221).
Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in
Paper / Subject Code: 88904 / Cryptography and System Security
Calculate their private keys. A wishes to send message m=5 to B. Show the
A2 6 C C2 7 70 8F 3A 6E 2 D 0F E5 A2 D6 C C2 D7 70 8F
b) What are traditional ciphers? Discuss any one substitution and transposition
private key x=5, what is A’s Public Key R1? If user B has private key y=12,
D6 BC 0C D7 770 98 63 6E E2 AD A0 E5 8A D6 BC 0C D7 77 98 63
Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key
b) What are the requirements of the cryptographic hash functions? Compare MD5
c) What is authentication header(AH)? How does it protect against replay attacks?
prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has
2D 777 09 F6 A6 EE 2A A FE 58A 2D 6B 0C 2D 77 09 F6 3A
77 09 8F6 3A EE 2A DA 0FE 58 2D 6B C0 2D 77 709 8F6 3A 6E
70 8F 3A 6E 2A D 0F 5 A2 6 C C2 7 70 8F 3A 6E
98 63 6 E2 D A0 E5 8A D BC 0C D 77 98 63 6 E
F6 A6 EE A A FE 8A 2D 6B 0 2D 77 09 F6 A EE 2
(05)
(05)
(05)
(05)
(20)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
(10)
3A E 2A DA 0F 58 2 6B C0 C2 77 70 8F 3A 6E 2A
Page 1 of 1
6E E2A DA 0F E5 A2 D6 C C2 D7 70 98F 63A 6E E2
[Total Marks 80]
E2 D 0 E5 8A D6 BC 0C D7 77 98 63 6 E2 AD
AD A0 FE 8A 2D B 0C 2D 77 098 F6 A6 EE AD
A0 FE 58A 2D 6BC C0C 2D 777 098 F6 3A6 EE 2AD A
FE 58A 2D 6B 0C 2D 777 09 F6 3A EE 2A A
58 2D 6B C0 2D 77 09 8F6 3A 6EE 2A DA 0
A2 6 C C2 7 70 8F 3A 6E 2 D 0F
D6 BC 0C D7 770 98 63 6E E2 AD A0
BC 0C 2D 77 98 F63 A6 E2 AD A0 FE
0C 2D 777 098 F63 A6 EE AD A0 FE
7 0 E 2 5