Dot Net Technology - Jun 2014
Information Technology Engineering (Semester 6)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS (1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks. 1 (a) Explain various types of attack on computer system.(7 marks) 1 (b) What is security mechanism? List and explain various security mechanism.(7 marks) 2 (a) Explain the conventional security model used for information security.(7 marks) 2 (b) Explain cryptanalysis. Discuss any one technique for it.(7 marks) 2 (c) What attacks can be done on encrypted text? Explain them.(7 marks) 3 (a) Compare public key and private key cryptography. Also list various algorithms for each.(7 marks) 3 (b) With the help of example explain how can we find out GCD of two numbers using 07 Euclid algorithm.(7 marks) 3 (c) What is digital signature? Explain its use with the help of example.(7 marks) 3 (d) Explain play fair cipher with suitable example.(7 marks) 4 (a) Explain limitation of DES in detail.(7 marks) 4 (b) List and Explain various key management techniques.(7 marks) 4 (c) Explain RSA algorithm.(7 marks) 4 (d) How can we achieve web security? Explain with example.(7 marks)
Write a note on following (Any 4):
5 (a) Pretty Good Privacy.(4 marks) 5 (b) Kerberos.(4 marks) 5 (c) Hill cipher.(4 marks) 5 (d) Elliptic curve cryptography.(4 marks) 5 (e) Diffie-Hellman key exchange.(4 marks) 5 (f) Message Authentication code.(4 marks)