Be Computer Engineering Semester 6 2024 May Cryptography System Securityrev 2019 C Scheme
Be Computer Engineering Semester 6 2024 May Cryptography System Securityrev 2019 C Scheme
FF
X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security
47
FF
X2
B4
37
7Y
B4
47
FF
X
X2
23
47
FF
7Y
B4
FF
FX
7Y
B4
3
47
X2
B4
23
47
7Y
4
47
X
B
7Y
F
23
47
FF
Duration: 3Hours [Max Marks : 80]
7Y
23
X
B
B4
23
47
FF
FX
7
Y
23
47
37
FX
B4
4F
X
7
7Y
X2
N.B : (1) Question No 1 is Compulsory.
4F
23
47
FF
7B
3
FF
(2) Attempt any three questions out of the remaining five.
FX
7B
2
4
Y4
X
7B
7
B4
Y4
(3) All questions carry equal marks.
4F
FF
37
2
Y4
47
X
7B
37
(4) Assume suitable data, if required and state it clearly.
X2
4
FF
B
7
7Y
4
X2
47
FF
7B
Y
X2
4
23
FF
B
37
7Y
B4
Y4
47
FF
FX
1 Attempt any FOUR [20]
X2
B4
23
47
37
7Y
B4
4F
47
FF
FX
X2
a Explain Euclidean Algorithm.
23
47
7B
37
7Y
B4
4F
FF
X
Y4
23
FF
FX
B
37
2
B4
7
FX
37
FX
7Y
2
4
Y4
47
FX
7B
X2
B4
4F
4F
37
7Y
2
Y4
47
FF
7B
FX
7B
X2
4
23
7B
37
7Y
B4
Y4
Y4
FF
FX
X2
B4
23
47
37
37
B4
4F
7
X
37
7Y
X2
X2
Y4
2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47
7B
X2
B4
4F
FF
FF
7Y
attacks on it. Consider the example where A and B decide to use the Diffie
X2
Y4
3
FF
7B
B4
X2
B4
Y4
23
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
FF
37
B4
Y4
47
47
FF
FX
7
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
X2
B4
3
47
37
7Y
7Y
X2
4
4F
FF
B
X2
23
23
47
7B
7
FF
FX
7
FX
7Y
Y4
23
47
FX
B
B4
3 a Explain cryptographic hash functions with properties of secure hash function. [10]
4F
4F
23
47
FX
37
7Y
F
47
7B
X
7B
X2
4
4F
23
FF
7B
37
7Y
Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4
FF
FX
7B
2
B4
Y4
23
37
X
B4
Y4
4F
FF
FX
7
X2
23
47
7B
37
Y
4F
b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF
[10]
X
7B
37
7Y
X2
Y4
FF
7B
Y4
23
FF
37
X
B4
Y4
47
5 a What are the different components of IDS? List and explain different approaches
FF
FX
[10]
37
X2
B4
47
37
7Y
X2
of IDS.
4F
47
FF
7Y
X2
23
FF
[10]
7Y
B4
23
FF
FX
B4
Y4
23
47
FX
4F
47
FX
37
7Y
4F
1. Packet Sniffing.
47
7B
Y
X2
4F
23
7B
37
7Y
2. ARP spoofing.
Y4
FF
FX
7B
Y4
[10]
37
B4
Y4
4F
FX
37
X2
47
B
37
2
4F
47
FF
FX
7Y
X2
7B
7Y
B4
_____________
4F
23
FF
Y4
23
47
FX
7B
B4
FX
37
7Y
4F
47
X2
4F
23
7B
7Y
FF
FX
7B
Y4
3
X2
B4
Y4
4F
37
55415 Page 1 of 1
47
FF
7B
37
2
FX
7Y
X2
B4
Y4
23
47
FF
37
FX
7Y
X2
B4
X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF