We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Paper /Subject Code: 82909 / Computer Science: Information & Network Seeurity (R-2023)
(2 ½ Hours) [Total Marks: 75|
N.B. 1) Allquestions are compulsory.
2)Figures to the right indicate marks. 3)Illustrations, in-depth answers and diagrams will be appreciated. 4) Mixing of sub-questions is not allowed.
Q. 1 Attempt ANY FOUR from the following: (20M)
(a) Discuss OSI Sccurity model architecture highlighting the attacks, mechanisms and serviccs. (b) Ditferentiate between active and passiveattacks. (c) Encrypt the following using play fair cipher using the keyword MONARCHY. "SWARAJ IS MY BIRTH RIGHT". Use Xas filler character. (d) Explain in detail the transformations take place in AES cneryption proccdure. (e) Describe the working principle of DES with a neat diagram. () Perform encryption and decryption using RSA Algorithm for the following. P=7; q=ll; e=17; M=8
Q.2 Attempt ANY FOUR from the following: (20M)
Discuss how Diffie Hellman key exchange algorithm is a practical method for public (a) exchange of a sccret key? (b) What is Message Authentication code? Explain its functions and basic uses. (c) Explain key management and distribution in detail. (d) What is the purpose of digital signature? Explain its properties and requirements. (e) Explain how authentication is performed in Kerbcros. () What is Public Key certificate? Explain its usage with X.509 certificates.
Attempt ANY FOUR fromthe following: (20M)
Q.3 (a) Explain how email messages are protected using S/MIME signing and encryption? (b) With a neat sketch explain the IPSec scenario and IPSec Services. (c) Explaindifferent Web security requirements. Discuss Intrusion detection in detail. (d) (e) Give the luxonomy of' malicious programs. Detine each one. () What is a firewall? What is the need for tirewalls? What is the role of tirewalls in prolecting networks?
Q.4 Attempt ANY FIVE lrom the followiug: (15M)
(a) Compare stream cipher with block cipher with exaple. (b) Differentiate MAC and Hush function. (c) Why is asym1netric cryptograply bud lor hugeduta? Specity the reason. (d) What is dual signature? What is its purpose? (e) Define the role of dillerent SSL protocols. () What is neant by SET? WIhat are its features?