written 7.9 years ago by |
Information Security - Jun 2014
Computer Engineering (Semester 6)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
1 (a) Explain various types of attack on computer system.(7 marks)
1 (b) What is security mechanism? List and explain various security mechanism.(7 marks)
2 (a) Explain the conventional security model used for information security.(7 marks)
2 (b) Explain cryptanalysis. Discuss any one technique for it.(7 marks)
2 (c) What attacks can be done on encrypted text? Explain them.(7 marks)
3 (a) Compare public key and private key cryptography. Also list various algorithms for each.(7 marks)
3 (b) With the help of example explain how can we find out GCD of two numbers using 07
Euclid algorithm.(7 marks)
3 (c) What is digital signature? Explain its use with the help of example.(7 marks)
3 (d) Explain play fair cipher with suitable example.(7 marks)
4 (a) Explain limitation of DES in detail.(7 marks)
4 (b) List and Explain various key management techniques.(7 marks)
4 (c) Explain RSA algorithm.(7 marks)
4 (d) How can we achieve web security? Explain with example.(7 marks)
Write a note on following (Any 4):
5 (a) Pretty Good Privacy.(4 marks) 5 (b) Kerberos.(4 marks) 5 (c) Hill cipher.(4 marks) 5 (d) Elliptic curve cryptography.(4 marks) 5 (e) Diffie-Hellman key exchange.(4 marks) 5 (f) Message Authentication code.(4 marks)