written 8.6 years ago by |
Cryptography & System Security - May 2013
Computer Engineering (Semester 7)
TOTAL MARKS: 80
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks.
1(a) Explain Different Birthday problems.(5 marks)
1(b) What are the key principles of security?(5 marks)
1(c) Compare and contrast SHA-1 and MD5.(5 marks)
1(d) Explain Honey Pots.(5 marks)
2(a) How flaw in TCP/IP can cause operating system to become vulnerable? Also explain how Kerberos are used for user authentication in windows?(10 marks)
2(b) For the given values p=19,q=23 and e=3, find ? (n) and d using RSA algorithm.(10 marks)
3(a) What is Buffer overflow and incomplete mediation in software security?(10 marks)
3(b) Explain one time initialization process and processes in each round of advanced encryption standard.(10 marks)
4(a) What is denial of service attack? What are the ways in which a user can mount dos attack on the system?(10 marks)
4(b) Compare Packet Sniffing and Packet Spoofing. Explain session hijacking attack.(10 marks)
5(a) Explain Multi Level Security Model. Also explain multi lateral security.(10 marks)
5(b) What is Malware? Explain Salami and Linearization attacks.(10 marks)
6(a) Explain Software Reverse Engineering. Also explain Digital Rights Management.(10 marks)
6(b) Describe the different types of IDS and their limitations.(10 marks)
Write short notes on (any four) :-
7(a) CAPTCHA(5 marks) 7(b) Access Control Matrix(5 marks) 7(c) Covert Channel(5 marks) 7(d) Firewall(5 marks) 7(e) RC4(5 marks)