Cryptography & System Security : Question Paper May 2015 - Computer Engineering (Semester 7) | Mumbai University (MU)
1 Answer

Cryptography & System Security - May 2015

Computer Engineering (Semester 7)

(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks.

1 (a) Distinguish between substitution cipher and transposition cipher. (5 marks)

1 (b) What are different types of malicious codes. (5 marks)

1 (c) What are the different types of IP-Spoofing. (5 marks)

2 (a) A and B decide to use Diffie-Hellman key exchange where P=13, g=2. Each choose his own secret no. and exchange nos. 6 and 11.
i) What is common secret key?
ii) What are their secret nos?
iii) Can intruder M, gain any knowledge from protocol run if he sees p, g and the 2 public keys 6 & 11. If yes, show how?
(10 marks)

2 (b) Explain structure of DES. (10 marks)

3 (a) Describe block ciphers? Explain any one with example. (10 marks)

3 (b) Explain difference between MAC and message digest? What is role of compression function in general structure of message digest? (10 marks)

4 (a) What is Reverse Engineering? Explain need of Digital Rights Management. (10 marks)

4 (b) What is Buffer overflow and incomplete mediation in Software Security? (10 marks)

5 (a) How does ESP header guarantee confidentiality & integrity for packet payload? (10 marks)

5 (b) What makes a network vulnerable? (10 marks)

6 (a) What are different types of firewalls? Explain design, configuration and limitations. (10 marks)

6 (b) IPSec offers security at network layer. What is the need of SSL? Explain the services of SSL protocol? (10 marks)

Write short notes on (any two):

7 (a) MDS. (10 marks)

7 (b) Covert Chanel. (10 marks)

7 (c) CAPCHA. (10 marks)

7 (d) Trojan. (10 marks) 1 (d) Differentiate between - vulnerability, threats and controls.(5 marks)

Please log in to add an answer.