Cryptography & System Security - May 2014
Computer Engineering (Semester 7)
TOTAL MARKS: 80
TOTAL TIME: 3 HOURS (1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks. 1 (a) What are the different security goals ?(5 marks) 1 (b) What is keyless transposition cipher?Give any example of Rail-fence cipher.(5 marks) 1 (c) What are the different parameters to measure the accuracy of biometric techniques? Also write the application of biometrics.(5 marks) 1 (d) What are the various types of IP Spoofing?(5 marks) 2 (a) Explain the TCP/IP vulnerabilities at each layer.(10 marks) 2 (b) What are the typical characteristics of enterprise wide networks ? Explain its different router vulnerabilities and firewall vulnerabilities.(10 marks) 3 (a) Explain A5/1 algorithm in detail.(10 marks) 3 (b) What are passive and active attacks? Categorize these attacks and explain one example of each.(10 marks) 4 (a) What is SHA-1?Explain different steps of working in SHA-1.(10 marks) 4 (b) What are the different methods of malware detection? Explain with their advantages and disadvantages.(10 marks) 5 (a) What is Bell-LaPadula? How does Bell-LaPadula model works?(10 marks) 5 (b) Explain different method to commit a session hijack and methods to prevent session hijacking.(10 marks) 6 (a) Why Secure Socket Layer is needed? What are the different features SSL provide? Explain how SSL works?(10 marks) 6 (b) How does Kerberos work? Explain with example.(10 marks)
Write short notes on the following
7 (a) Multiple DES(10 marks) 7 (b) Software Reverse Engineering (SRE) and prevention of SRE(10 marks)