0% found this document useful (0 votes)
12 views10 pages

Css Previous Year Questions All

The document outlines an examination paper for Cryptography and System Security, consisting of various questions covering topics such as encryption methods, security protocols, and attack types. It includes compulsory questions and options for students to select additional questions to answer, focusing on practical applications and theoretical knowledge in cryptography. The paper emphasizes the importance of understanding security mechanisms, algorithms, and their implications in real-world scenarios.

Uploaded by

aayushgunjal8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views10 pages

Css Previous Year Questions All

The document outlines an examination paper for Cryptography and System Security, consisting of various questions covering topics such as encryption methods, security protocols, and attack types. It includes compulsory questions and options for students to select additional questions to answer, focusing on practical applications and theoretical knowledge in cryptography. The paper emphasizes the importance of understanding security mechanisms, algorithms, and their implications in real-world scenarios.

Uploaded by

aayushgunjal8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Paper / Subject Code: 88904 / Cryptography and System Security

[3 Hours] [Total Marks 80]

N.B: 1. Question No. 1 is Compulsory.


2. Solve any THREE from Question No. 2 to 6.
3. Draw neat well labeled diagram wherever necessary.

Q.1 a) Enlist security goals. Discuss their significance. (05)


b) Compare AES and DES. Which one is bit oriented? Which one is byte oriented? (05)
¢) What is authentication header(AH)? How does it protect against replay attacks? = (05)
d) List various Software Vulnerabilities. How vulnerabilities are exploited to (05)
launch an attack.

Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key (10)
pair (3, 7). Decrypt to get back original plaintext.
b) Explain different types of Denial of Service attacks. (10)

Q.3 a) Users A and B use the Diffie-Hellman key exchange technique with a common (10)
prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has
private key x=>5, what is A’s Public Key R:? If user B has private key y=12,
what is B’s public key R,? What is the shared secret key?
b) What are traditional ciphers? Discuss any one substitution and transposition (10)
cipher with example. List their merits and demerits.

Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221). (10)
Calculate their private keys. A wishes to send message m=5 to B. Show the
message signing and verification using RSA digital signature.
b) Discuss in detail block cipher modes of operation. (10)

Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in (10)
detail.
b) What are the requirements of the cryptographic hash functions? Compare MD5 (10)
and SHA Hash functions. State real world applications of hash functions.

Q.6 ‘Write short notes on any FOUR: (20)


a. Kerberos
Buffer Overflow
o o

3DES
X.509
IDS
o

68093 Page 1of 1

0C2D777098F63A6EE2ADAOFES8A2D6BC
Paper / Subject Code: 88904 / Cryptography and System Security

(3 hours) Total marks: 80

N.B 1) Question no 1 is compulsory


2) Attempt any three questions from remaining five questions
3) Assume suitable data if required
4) Draw neat diagram wherever necessary

Q1 Answer any Four


‘Why digital signature and digital certificates are required? (05)
Explain with example keyed and keyless transposition cipher (05)
Explain key rings in PGP? (05)
‘What are properties of hash function? Explain role of hash function in security (05)
Using Chinese remainder theorem solve the following: (05)
x=2 (mod 3), x=3 (mod 5), x=2(mod 7), Find x?

Q2 a) If A and B wish to use RSA to communicate securely. A chooses public key (e ,n)as (10)
(7,247) and B chooses public key (e, n) as (5, 221)
i. Calculate A’s Private key.
ii. Calculate B’s Private Key.
iil. What will be the cipher text sent by A to B, if A wishes to send M=5to B

b) ‘What is meant by DOS Attack? What are different ways mount DOS attacks? (10)
Q3 a) How does ESP header guarantee confidentiality and integrity of packet payload? (10)
b) Explain structure of DES wrt: (10)
1. Fiestel structure and its significance
ii. Significance of extra swap between left and right half blocks
iil. Expansion
iv. Significance of S-box
v. DES function

Q4 a) ‘What is the need of SSL? Explain SSL Handshake Protocol (10)


Encrypt the given message using Autokey Cipher, Key=7 and the Message is: (10)
“The house is being sold tonight”.

Q5 a) Explain man in the middle attack on Diffie Hellman . Explain how to overcome the (10)
same.
Use the playfair cipher with the keyword: “HEALTH” to encipher the message “Life (10)
is full of Surprises”

Explain Kerberos in detail (10)


‘What are different types of firewall? How firewall is different than IDS? (10)
______ D

68095 Page1of1

F3028E6590CFB6C7ECE525AA0AO0BEIDB
Paper / Subject Code: 89282 / Cryptography & System Security

Duration: 3Hours [Max Marks : 80]

N.B : (1) Question No 1 is Compulsory.


(2) Attempt any three questions out of the remaining five.
(3) All questions carry equal marks.
(4) Assume suitable data, if required and state it clearly.

1 Attempt any FOUR [20]


Explain Euclidean Algorithm.
2

Explain RC4 stream cipher.


o

¢ Differentiate between SHA-1 and MD5


Explain worms and viruses
a

e Discuss RSA as a digital signature algorithm.


2 ~a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
attacks on it. Consider the example where A and B decide to use the Diffie
Hellman algorithm to share a key. ‘They choose p=23 and g=5 as the public
parameters. Their secret keys are 6.and 15 respectively. Compute the secret key
that they share
b Explain Advanced Encrypted Standards (AES) in detail. [10]
3 a Explain cryptographic hash functions with properties.of secure hash function: [10]

b ~What is ICMP flood attack? Explain in detail. [10]


4 a Explain Public Key Distribution in detail. [10]
b Encrypt the string “The Key is hidden under the door” with Play fair cipher using [10]
the keyword “domestic”.
5 a What are the different components of IDS? List and explain different approaches [10]
of IDS.
b Explain Needham-schroeder authentication protocol. [10]
6 a Write a short note on [10]
1. Packet Sniffing.
2. ARP spoofing.
b Discuss various attacks on Digital signatures. [10]

55415 Page1of1

X237Y4TB4FFX237Y4TB4FFX237Y47BAFFX237Y4TBAFF
Paper / Subject Code: 89282 / Cryptography & System Security

TE GorR | S | CBoees [RAT ‘¢ M/&,Lx»gw/bfl Yo


1-0C
2] 2a¥
oi- 008 2
Duration: 3 hours [M arks° 80]

B.: (1) Question No 1 is Compulsory.


(2) Attempt any tnree questions out of the remaining five.
(3) All questions carry equal marks.
(4) Assume suitable data, if required and state it clearly.

Q1. 20
a. Explain TCP/IP vulnerabilities layer wise.
b. Give examples of replay attacks. List three general approaches for
dealing with replay attack. / »
¢. Explain algorithmic modes encryption process of symmetrié»key.
d. Explain different hash algorithm properties.

Q2a. Apply Diffie Hellman key exchange algorithm, two users P & Q will 10
agree on two numbers as n=11 common prime & g=7 is generator. x=3,
y=6 are private keys of P & Q respectively. What is shared secret key?

b. Discuss DES with reference to followmg points 10


1. Block size and key size & <
2.Need of exparision permutation
3.Role of S-box
4.Weak keys and semi weak keys
5. Possible attacks on DES

Q3 a. What characteristics are needed in secure hash function? Explain secure 10


hash algorithm on 512 bits.
b. Use RSA algorithm, user A has public key (17,321), B has public key 10
(5,321). Calculate private keys of both the users. Encrypt m=7 by B’s
public keys. How B.can decrypt the same.

Q4a. How does PGP achieve confidentiality and authentication in emails? 10


b. Use the Play fair cipher with the key "DOCUMENT" to encrypt the 10
message "ALL THE BEST"

Q5a. Why are digital certificates and signatures required? What is the role of 10
“ndigital signature in digital certificates? Explain any one digital signature
+. algorithm.
. b. What are different types of firewalls? How firewail is different from 10
IDS.

Q6a. Explain DES algorithm with flowcharts. 10


b. What is DDOS Attack and how it is launched? 10

69762 Page 1 of 1

VAITVANCCAAYVAI TUA RGO VAT TVANCCACYA 1TV AN O


Paper / Subject Code: 89282 / Cryptography & System Security

Duration: 3hrs [Max Marks: 80]

N.B.: (1) Question No 1 is Compulsory.


(2) Attempt any three questions out of the remaining five.
(3) All questions carry equal marks.
(4) Assume suitable data, if required and state it clearly.

1 Attempt any FOUR [20]


Explain the relationship between Security Services and Mechanisms in detail.
ow

Explain ECB and CBC modes of block cipher.


Define non-repudiation and authentication. Show with example how it can be achieved.
a6

Explain challenge response-based authentication tokens.


Explain buffer overflow attack.
o

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the [10]
public key (E, N) of user A is defined as (7,187). Calculate ®(N) and private key ‘D’.
‘What is the cipher text for M=10 using the public key.

Discuss DES with reference to following points [10]


<

1. Block size and key size


2.Need of expansion permutation
3.Role of S-box
4.Weak keys and semi weak keys
5. Possible attacks on DES

3 a What goals are served using a message digest? Explain using MD5. [10]
‘What is DDOS attack? Explain how is it launched. [10]
<

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
in digital certificates? Explain any one digital signature algorithm.
b How does PGP achieve confidentiality and authentication in emails? [10]
5 a State the rules for finding Euler’s phi function. Calculate [10]
a. (L)
b. 9(49)
c. (240
b Explain Kerberos. Why is it called as SSO? [10]
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
handshake protocol.
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
AH and ESP.

28998 Page1of1

53AB98349E20188798C3D824B8DS5C59F
Paper / Subject Code: 8928é / Cryptography & System Security
T.E. SEM VI/ COMP - C SCHEME / DEC 2023 / 13.12.202¢

Duration: 3hrs | Max Marks: 80]

N.B.: (1) Question No 1 is Compulsory.


(2) Attempt any three questions out of the remaining five.
(3) All questions carry equal marks.
(4) Assume suitable data, if required and state it clearly.

1 Attempt any FOUR y 20]

a Give examples of replay attacks. List three general approaches for dealing with
replay attack.

b Explain key rings in PGP.

¢ What are the different protocols in SSL? How do client and scrver establish SSL
connection?
d Explain TCP/IP vulnerabilities layer wise.
e What is the purpose of S-boxes in DES? Explain the avalanche effect.

2 a Whatis need for message authentication? List various techniques used for [10]

message authentication. Explain any one.


b What characteristics are needed:in secure hash function? Explain secure hash [10]
algorithm on 512 bit.

3 a Use Hill cipher to encrypt the text “short™. The key to be used is hill. [10]
b Explain man in middle attack on Diffie Hellman. Explain how to overcome the [10]
same. ‘

4 a ExplainIPSec protocol in detail. Also write applications and advantages of [10]

IPSec
b Whatare different types of firewall? How firewall is different from IDS. [10]

5..a Explain Kerberos in detail. [10]


b Provide a comparison between HMAC, CBC-MAC and CMAC. [10]

6 a Whatis PKI? List its components. [10]


b What is digital certificate? How does it help to validate authenticity of a user.
Explain X.509 certificate format.

o ok ok

40010

696BDTFFAEACFB8STIECIA4698B09BS |
r—Elerfl/F/V) / Ry {PstQL/ ags/%\;j[g 2
<

University of Mumbai @ P GQ
Examinations Summer 2022
Time: 2 hour 30 minutes

Choose the correct option for following quest


QL. compulsory and carry equal marks
. The principle of .............. ensures that tl
deny sending of the message g
Option A: | Authentication
Option B: | Non repudiation
Option C: | Access control
Option D: | Integrity

2 Rail Fence Technique is an examplé of


Option A: | Substitution :
Option B: | Transposition _
Option C: | product cipher
Option D: | Caesar cipher

3 The number of symme c ke I & communication between 8


people is S T
Option A:
Option B:
Option C:
Option D:

4. yde if the ciphertext is 39


Option A: z
Option B:
Option C:
Option D:* |

What;;s \honey potattack?


dummy device put into the network to attract attackers
=
“single.line threat
PP spooF ing | bypaSs
ecognition atta ick-

not a component of Public key infrastructure (PKI)?

1| Page

Sl
7873162B79775C39DDCAB40D2C144C00
8.
Tesources.
Option A: | Phishing attack
Option B: | DoS attack
Option C: | Website scripting attack
Option D: | SQL injection attack

9. Secure Hash Algorithm -1 (SHA-1) has a mes:


Option A: | 160 bits
Option B: | 512 bits
Option C: | 628 bits
Option D: | 820 bits

10. ‘Which of the following is consnderefl


Option A: | Virus
Option B: | Malware
Option C: | Spam
Option D: | Adware

marks each
hanisms in detail.

5 marks each

g 3
Expldin working of TGS in Kerberos.
“List and explain various types of attacks on encrypted message.
['Solfie Any One 10 marks each
“Why are digital certificates and signatures required?What is the role of
signature in digital certificates? Explain any one digital
Py
ature algorithm.
What is the need for message authentication? List various techniques
used for message authentication. Explain any one of them.

2| Page
S
7873162B79775C39DDCAB40D2C144C00
3>l' Pége
I
i eailst
wu Sedbilite
ey

22
2g

7873162B79775C39DDCAB40D2C144C00
@ «
i

z
2.8
o
| o
|E|E
B=1ic] |
mmm
e K
8ls .
HECPREE
SIEIEY |EEE
I3 HEEEREIEE
[email protected].
EI31E| s 58(2|5
V..mb.oh wmf
%
Ele mmm,osm
s|2|5|5 5|5|5) 8
HEEESEHEH
EIE] I -
<= [}
B B
*

Paper / Subject Code: 89282 / Cryptography & System Security

-
TE /CMPN /sem@ C-2019) PEC. nor2.
(3 Hours) [Total Marks: 80]

N.B.: (1) Question No 1 is Compulsory.


(2) Attempt any three questions out of the remaining five.
(3) All questions carry equal marks. <
(4) Assume suitable data, if required and state it clearly.

1 Attempt any FOUR . < [20]


a BExplain with examples keyed and keyless transposition ciphers. N
b 3
Explain the different modes of block ciphers. pe
¢ Differentiate between SHA-1 and MD5 '
‘What is Buffer overflow attack?
e

e Explain ARP spoofing. . &

2 a Explain Diffie Hellman key agreement algorithm. Also discuss. the possible [10]
attacks on it. Consider the example where A and B decide to-use the Diffie
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
that they share. N
b Explain AES algorithm. Highlight the difference between AES and DES. [10]

3 a Explain various types of firewalls. ' 2 3‘ A [10]


b Discuss various attacks on digital signatu}es and the methods by which they can [10]
be overcome. <

4 a Elaborate the sign and verification process of RSA as a digital signature scheme. [10]
b Write short notes on [10]
L. Packet sniffing
2. SQL injection
s
% i
5 a State the rules for finding Euler’s phi function. Calculate [10]
a. 9(10) :
b g49)
c. 9(343) ¢
b Explain Kerberos as an authentication service. [10]
6 a Enlistthe various functionsof the different protocols of SSL. Explain the phases [10]
of handshake protocol.
b How does ESP header guarantee confidentiality and integrity of packet payload? [10]
What is an authentication header (AH)? How does it protect against replay
attack? >

Q. P (OPE
14472 Pagelof1

ATIF679C53B79281A1E552B4507CC66D

You might also like