0
3.6kviews
Cryptography & Network Security Question Paper - Jun 19 - Information Technology (Semester 5) - Mumbai University (MU)
1 Answer
0
232views

Cryptography & Network Security - Jun 19

Information Technology (Semester 5)

Total marks: 80
Total time: 3 Hours
INSTRUCTIONS
(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Draw neat diagrams wherever necessary.

1.a. A secure e-voting system is to be designed. Discuss the security goals that must be met and enlist mechanisms for the same.
(5 marks) 00

1.b. What is the drawback of Double DES algorithm? How is it overcome by Triple DES?
(5 marks) 00

1.c. Define ARP spoofing with an example. Compare with IP spoofing.
(5 marks) 00

1.d. What is the significance of a digital signature on a certificate? Justify
(5 marks) 00

2.a. Encrypt "This is the final exam" with Playfair cipher using key "Guidance". Explain the steps involved
(10 marks) 00

2.b. Compare and contrast DES and AES.
(10 marks) 00

3.a. Two uses wish to establish a secure communication channel and exchange a session key after mutual authentication. Show how this can be done with the help of a KDC.
(10 marks) 00

3.b. Given modulus n = 221 and public key, e = 7, find the values of p,q, phi(n) and d using RSA. Encrypt M = 5.
(10 marks) 00

4.a. Define DOS attack. Show the different ways by which this attack can be mounted at various layers.
(10 marks) 00

4.b. Show how Kerberos protocol can be used to achieve single sign - on in distributed systems.
(10 marks) 00

5.a. A user wishes to do online transactions with Amazon.com. Discuss a protocol which can be used to set up a secure communication channel and provide server side and client side authentication. Show the steps involved in the handshake process.
(10 marks) 00

5.b. What is a firewall? Explain different types of firewalls and list their advantages.
(10 marks) 00

6.a. Write short notes on(any two):

  1. Email Security.

  2. Diffie Hellman Algorithm.

  3. El-Gamal Algorithm.

(10 marks) 00

6.b. How does IPSec help to achieve authentication and confidentially? Justify the need of AH and ESP.
(10 marks) 00

Please log in to add an answer.