Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
238 views

Cryptography and Security Systems (CSS) Brain Heaters

The document contains solutions to questions on a Mumbai University computer science exam on cryptography and system security. It includes summaries of concepts like the RSA algorithm, DES, digital signatures, firewalls, intrusion detection systems, and short notes on topics like SSL, IPSec protocols, denial of service attacks, and the IDEA cipher. The document provides detailed explanations and examples for the various cryptography and security mechanisms, standards, and attacks covered in the exam.

Uploaded by

Faizan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views

Cryptography and Security Systems (CSS) Brain Heaters

The document contains solutions to questions on a Mumbai University computer science exam on cryptography and system security. It includes summaries of concepts like the RSA algorithm, DES, digital signatures, firewalls, intrusion detection systems, and short notes on topics like SSL, IPSec protocols, denial of service attacks, and the IDEA cipher. The document provides detailed explanations and examples for the various cryptography and security mechanisms, standards, and attacks covered in the exam.

Uploaded by

Faizan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Mumbai University Computers ( Semester – VII )

Solution for Cryptography & System Security


May-2016
Index
Q.1)
a) …………………………………………………………………………. 2 (N.A.)
b) …………………………………………………………………………. 2 - 3
c) …………………………………………………………………………. 3 - 4
d) …………………………………………………………………………. 5 – 6
Q.2)
a) …………………………………………………………………………. 6 (N.A.)
b) …………………………………………………………………………. 7 to 13
Q.3)
a) …………………………………………………………………………. 13
b) …………………………………………………………………………. 14 - 15
Q.4)
a) …………………………………………………………………………. 15 - 16
b) …………………………………………………………………………. 17 to 19
Q.5)
a) …………………………………………………………………………. 19
b) …………………………………………………………………………. 19 to 25
c) …………………………………………………………………………. 25 to 28
Q.6)
a) …………………………………………………………………………. 28 - 29
b) …………………………………………………………………………. 29 to 32
c) …………………………………………………………………………. 32 - 33
d) …………………………………………………………………………. 34
e) …………………………………………………………………………. 35 to 37

1 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.1) Attempt All (20)


a) Explain software flaws with examples.

Ans :- N.A.

b) List with examples the different mechanism to achieve security.

Ans :- Security Mechanisms

2 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

c) Explain with examples, keyed and keyless transposition ciphers.

Ans :-

3 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

4 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

d) Elaborate the steps of key generation using RSA algorithm. (05)


Ans :- RSA Algorithm

5 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.2)
a) A and B decide to use Diffie-Hellman algorithm to share a key. They chose p=23 and
g=5 as the public parameters. Their secret key that they share. (10)

Ans :- N.A.

6 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) Explain working of DES. (10)


Ans :- Data Encryption Standard

7 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Detail steps in DES :-

Initial Permutation (IP) :-

8 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Rounds :-

9 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

10 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Final Permutation :-

11 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Advantage of DES :-

Disadvantage in DES :-

Double Des :-

Triple DES :-

12 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.3)
a) What is access control? How does the Bell La padula module achieve access control.(10)

Ans :- The Bell-LA Padula Model (BLP)

13 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

B) What is Digital signature. Explain any digital signature algorithm in


detail.(10)
Ans :- Digital Signature

14 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.4)
a) Compare packet sniffing and packet spoofing. Explain session hijacking attack (10)

Ans :- Session Hijacking and Spoofing

15 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

16 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) Explain working of Kerberos. (10)


Ans :- Kerberos 5.0

17 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

18 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.5)
a) What is Firewall? What are the Firewall design principles? (05)
Ans :- Firewall

Design of Firewall :-

b) What are the various ways for memory and address protection.(05)

Ans :- Operating System Security

19 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

20 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

21 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

22 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

23 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

24 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

C) Explain the significance of an Intrusion Detection System for securing a network.


Compare signature based and anomaly based IDS. (10)
Ans :-

25 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

26 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

27 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

Q.6) Write short note on (Any Four) (20)

a) Email Security
Ans :-

28 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

b) SSL handshake protocol

Ans :- Working Of SSL

29 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

30 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

31 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

c) IPSec protocols for security.

Ans :- Security protocols :-

32 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

33 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

34 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

d) Denial of service attacks.


Ans :-

e) IDEA

Ans :-

35 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

36 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

37 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )

38 |www.brainheaters.in

You might also like