0
2.1kviews
Cryptography & System Security : Question Paper Dec 2014 - Computer Engineering (Semester 7) | Mumbai University (MU)
1 Answer
0
10views

Cryptography & System Security - Dec 2014

Computer Engineering (Semester 7)

TOTAL MARKS: 80
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks.
1 (a) What is Multilateral Security?(5 marks) 1 (b) Compare Stream and Block encryption algorithms.(5 marks) 1 (c) Distinguish between attack, vulnerability and access control.(5 marks) 1 (d) What is Buffer overflow and incomplete mediation in Software Security?(5 marks) 2 The following questions are based on scenario in which encrypted data are passed between Alice and Bob using RSA algorithm. Alice's public key is {17, 23} and Bob's public key is {5,23}. Assume that no one knows the private keys but the original owners.
i) Encrypt the message M=7 using Bob's public key.
ii) What should Alice have to do to decrypt the message from Q-2 a?
iii) What would Bob have to do to decrypt the message from Q-2 a?
iv) What is Alice's private key?
v) What is Bob's private key?
(20 marks)
3 (a) Explain how threat precursors are used for Reconnaissance of network.(10 marks) 3 (b) Upon reception of a digital certificate, how one can decide whether to trust that or not.(10 marks) 4 (a) Explain Physiological and Behavioral biometric techniques with example.(10 marks) 4 (b) Write short note on Access control List (ACL) and Capabilities.(10 marks) 5 (a) What is a firewall? Explain different type of firewall.(10 marks) 5 (b) Explain various types of port scan.(10 marks) 6 (a) What is spoofing? Explain ARP spoofing.(5 marks) 6 (b) What is SQL Injection? Give Example.(5 marks) 6 (c) Compare packet sniffing and packet spoofing. Explain the session hijacking attack.(10 marks)


Write short notes on any two

7 (a) Compare AES and DES(10 marks) 7 (b) Explain different Security Mechanisms.(10 marks) 7 (c) Various ways for Memory and Address Protection.(10 marks)

Please log in to add an answer.