Css Previous Year Questions All
Css Previous Year Questions All
Q.2 a) Encrypt the plaintext message “SECURITY” using affine cipher with the key (10)
pair (3, 7). Decrypt to get back original plaintext.
b) Explain different types of Denial of Service attacks. (10)
Q.3 a) Users A and B use the Diffie-Hellman key exchange technique with a common (10)
prime 71 and primitive root 7. Show that 7 is primitive root of 71. If user A has
private key x=>5, what is A’s Public Key R:? If user B has private key y=12,
what is B’s public key R,? What is the shared secret key?
b) What are traditional ciphers? Discuss any one substitution and transposition (10)
cipher with example. List their merits and demerits.
Q.4 a) Alice chooses public key as (7, 33) and B chooses public key as (13, 221). (10)
Calculate their private keys. A wishes to send message m=5 to B. Show the
message signing and verification using RSA digital signature.
b) Discuss in detail block cipher modes of operation. (10)
Q.5 a) What is the need of SSL? Explain all phases of SSL Handshake protocol in (10)
detail.
b) What are the requirements of the cryptographic hash functions? Compare MD5 (10)
and SHA Hash functions. State real world applications of hash functions.
3DES
X.509
IDS
o
0C2D777098F63A6EE2ADAOFES8A2D6BC
Paper / Subject Code: 88904 / Cryptography and System Security
Q2 a) If A and B wish to use RSA to communicate securely. A chooses public key (e ,n)as (10)
(7,247) and B chooses public key (e, n) as (5, 221)
i. Calculate A’s Private key.
ii. Calculate B’s Private Key.
iil. What will be the cipher text sent by A to B, if A wishes to send M=5to B
b) ‘What is meant by DOS Attack? What are different ways mount DOS attacks? (10)
Q3 a) How does ESP header guarantee confidentiality and integrity of packet payload? (10)
b) Explain structure of DES wrt: (10)
1. Fiestel structure and its significance
ii. Significance of extra swap between left and right half blocks
iil. Expansion
iv. Significance of S-box
v. DES function
Q5 a) Explain man in the middle attack on Diffie Hellman . Explain how to overcome the (10)
same.
Use the playfair cipher with the keyword: “HEALTH” to encipher the message “Life (10)
is full of Surprises”
68095 Page1of1
F3028E6590CFB6C7ECE525AA0AO0BEIDB
Paper / Subject Code: 89282 / Cryptography & System Security
55415 Page1of1
X237Y4TB4FFX237Y4TB4FFX237Y47BAFFX237Y4TBAFF
Paper / Subject Code: 89282 / Cryptography & System Security
Q1. 20
a. Explain TCP/IP vulnerabilities layer wise.
b. Give examples of replay attacks. List three general approaches for
dealing with replay attack. / »
¢. Explain algorithmic modes encryption process of symmetrié»key.
d. Explain different hash algorithm properties.
Q2a. Apply Diffie Hellman key exchange algorithm, two users P & Q will 10
agree on two numbers as n=11 common prime & g=7 is generator. x=3,
y=6 are private keys of P & Q respectively. What is shared secret key?
Q5a. Why are digital certificates and signatures required? What is the role of 10
“ndigital signature in digital certificates? Explain any one digital signature
+. algorithm.
. b. What are different types of firewalls? How firewail is different from 10
IDS.
69762 Page 1 of 1
2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the [10]
public key (E, N) of user A is defined as (7,187). Calculate ®(N) and private key ‘D’.
‘What is the cipher text for M=10 using the public key.
3 a What goals are served using a message digest? Explain using MD5. [10]
‘What is DDOS attack? Explain how is it launched. [10]
<
4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
in digital certificates? Explain any one digital signature algorithm.
b How does PGP achieve confidentiality and authentication in emails? [10]
5 a State the rules for finding Euler’s phi function. Calculate [10]
a. (L)
b. 9(49)
c. (240
b Explain Kerberos. Why is it called as SSO? [10]
6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
handshake protocol.
b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
AH and ESP.
28998 Page1of1
53AB98349E20188798C3D824B8DS5C59F
Paper / Subject Code: 8928é / Cryptography & System Security
T.E. SEM VI/ COMP - C SCHEME / DEC 2023 / 13.12.202¢
a Give examples of replay attacks. List three general approaches for dealing with
replay attack.
¢ What are the different protocols in SSL? How do client and scrver establish SSL
connection?
d Explain TCP/IP vulnerabilities layer wise.
e What is the purpose of S-boxes in DES? Explain the avalanche effect.
2 a Whatis need for message authentication? List various techniques used for [10]
3 a Use Hill cipher to encrypt the text “short™. The key to be used is hill. [10]
b Explain man in middle attack on Diffie Hellman. Explain how to overcome the [10]
same. ‘
IPSec
b Whatare different types of firewall? How firewall is different from IDS. [10]
o ok ok
40010
696BDTFFAEACFB8STIECIA4698B09BS |
r—Elerfl/F/V) / Ry {PstQL/ ags/%\;j[g 2
<
University of Mumbai @ P GQ
Examinations Summer 2022
Time: 2 hour 30 minutes
1| Page
Sl
7873162B79775C39DDCAB40D2C144C00
8.
Tesources.
Option A: | Phishing attack
Option B: | DoS attack
Option C: | Website scripting attack
Option D: | SQL injection attack
marks each
hanisms in detail.
5 marks each
g 3
Expldin working of TGS in Kerberos.
“List and explain various types of attacks on encrypted message.
['Solfie Any One 10 marks each
“Why are digital certificates and signatures required?What is the role of
signature in digital certificates? Explain any one digital
Py
ature algorithm.
What is the need for message authentication? List various techniques
used for message authentication. Explain any one of them.
2| Page
S
7873162B79775C39DDCAB40D2C144C00
3>l' Pége
I
i eailst
wu Sedbilite
ey
22
2g
7873162B79775C39DDCAB40D2C144C00
@ «
i
z
2.8
o
| o
|E|E
B=1ic] |
mmm
e K
8ls .
HECPREE
SIEIEY |EEE
I3 HEEEREIEE
[email protected].
EI31E| s 58(2|5
V..mb.oh wmf
%
Ele mmm,osm
s|2|5|5 5|5|5) 8
HEEESEHEH
EIE] I -
<= [}
B B
*
-
TE /CMPN /sem@ C-2019) PEC. nor2.
(3 Hours) [Total Marks: 80]
2 a Explain Diffie Hellman key agreement algorithm. Also discuss. the possible [10]
attacks on it. Consider the example where A and B decide to-use the Diffie
Hellman algorithm to share a key. They choose p=23 and g=5 as the public
parameters. Their secret keys are 6 and 15 respectively. Compute the secret key
that they share. N
b Explain AES algorithm. Highlight the difference between AES and DES. [10]
4 a Elaborate the sign and verification process of RSA as a digital signature scheme. [10]
b Write short notes on [10]
L. Packet sniffing
2. SQL injection
s
% i
5 a State the rules for finding Euler’s phi function. Calculate [10]
a. 9(10) :
b g49)
c. 9(343) ¢
b Explain Kerberos as an authentication service. [10]
6 a Enlistthe various functionsof the different protocols of SSL. Explain the phases [10]
of handshake protocol.
b How does ESP header guarantee confidentiality and integrity of packet payload? [10]
What is an authentication header (AH)? How does it protect against replay
attack? >
Q. P (OPE
14472 Pagelof1
ATIF679C53B79281A1E552B4507CC66D