0% found this document useful (0 votes)
61 views1 page

Be Computer Engineering Semester 6 2024 May Cryptography System Securityrev 2019 C Scheme

The document outlines an examination paper for Cryptography & System Security, detailing the structure, duration, and marking scheme. It includes instructions for answering questions, with specific topics such as the Euclidean Algorithm, RC4 stream cipher, and RSA digital signatures. Students are required to attempt a compulsory question and any three from the remaining five, with all questions carrying equal marks.

Uploaded by

Sneha Choudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views1 page

Be Computer Engineering Semester 6 2024 May Cryptography System Securityrev 2019 C Scheme

The document outlines an examination paper for Cryptography & System Security, detailing the structure, duration, and marking scheme. It includes instructions for answering questions, with specific topics such as the Euclidean Algorithm, RC4 stream cipher, and RSA digital signatures. Students are required to attempt a compulsory question and any three from the remaining five, with all questions carrying equal marks.

Uploaded by

Sneha Choudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

7

FF

X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security

47

FF
X2
B4
37

7Y

B4
47

FF

X
X2

23

47

FF
7Y

B4
FF

FX

7Y

B4
3

47
X2
B4

23

47
7Y

4
47

X
B

7Y
F

23

47

FF
Duration: 3Hours [Max Marks : 80]

7Y

23
X
B

B4
23

47

FF

FX
7

Y
23

47

37
FX

B4

4F
X
7

7Y

X2
N.B : (1) Question No 1 is Compulsory.

4F

23

47

FF

7B
3

FF
(2) Attempt any three questions out of the remaining five.

FX
7B

2
4

Y4
X
7B
7

B4
Y4
(3) All questions carry equal marks.

4F

FF

37
2

Y4

47
X
7B
37
(4) Assume suitable data, if required and state it clearly.

X2
4
FF

B
7

7Y

4
X2

47

FF

7B
Y

X2
4

23
FF

B
37

7Y

B4

Y4
47

FF

FX
1 Attempt any FOUR [20]
X2
B4

23

47

37
7Y

B4

4F
47

FF

FX

X2
a Explain Euclidean Algorithm.

23

47

7B
37
7Y

B4

4F

FF
X

Y4
23

b Explain RC4 stream cipher.


47

FF

FX
B
37

2
B4
7

FX
37
FX

7Y

2
4

Y4

47
FX
7B

c Differentiate between SHA-1 and MD5

X2
B4

4F
4F

37

7Y
2

Y4

47

FF

7B
FX
7B

d Explain worms and viruses

X2
4

23
7B
37

7Y

B4

Y4
Y4

FF

FX
X2
B4

Discuss RSA as a digital signature algorithm.


Y4

23

47

37
37

B4

4F
7

X
37

7Y

X2
X2

Y4

2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47

7B
X2
B4

4F

FF
FF

7Y

attacks on it. Consider the example where A and B decide to use the Diffie

X2

Y4
3

FF

7B

B4
X2
B4

Y4

23

Hellman algorithm to share a key. They choose p=23 and g=5 as the public

FF

37
B4

Y4

47
47

FF

FX
7

parameters. Their secret keys are 6 and 15 respectively. Compute the secret key

X2
B4
3

47

37

7Y
7Y

X2
4

4F

that they share


47

FF
B

X2

23
23

47

7B
7

b Explain Advanced Encrypted Standards (AES) in detail. [10]


B4
4F

FF

FX
7
FX

7Y

Y4

23

47
FX
B

B4

3 a Explain cryptographic hash functions with properties of secure hash function. [10]

4F
4F

23

47

FX
37

7Y
F

47

7B
X
7B

X2
4

4F

23
FF

7B
37

7Y

Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4

FF

FX
7B
2
B4

Y4

23

37
X

B4

Y4

4F

4 a Explain Public Key Distribution in detail. [10]


47

FF

FX
7

X2
23

47

7B
37
Y

4F

b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF

[10]
X
7B
37

7Y

X2

Y4
FF

7B

the keyword “domestic”.


B4
2

Y4

23

FF

37
X

B4

Y4

47

5 a What are the different components of IDS? List and explain different approaches
FF

FX

[10]
37

X2
B4
47

37

7Y
X2

of IDS.
4F

47

FF
7Y

X2

23
FF

b Explain Needham-schroeder authentication protocol.


7B

[10]
7Y

B4
23

FF

FX
B4

Y4

23

47
FX

6 a Write a short note on [10]


B4

4F
47

FX
37

7Y
4F

1. Packet Sniffing.
47

7B
Y

X2

4F

23
7B
37

7Y

2. ARP spoofing.
Y4
FF

FX
7B
Y4

b Discuss various attacks on Digital signatures.


23

[10]
37
B4

Y4

4F
FX
37

X2
47

B
37
2

4F

47

FF
FX

7Y

X2
7B

7Y

B4

_____________
4F

23

FF
Y4

23

47
FX
7B

B4

FX
37

7Y
4F

47
X2

4F

23
7B

7Y
FF

FX
7B
Y4

3
X2
B4

Y4

4F
37

55415 Page 1 of 1
47

FF

7B
37
2
FX

7Y

X2
B4

Y4
23

47

FF

37
FX

7Y

X2
B4

X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF

You might also like