Mumbai University Computers ( Semester – VII )
Solution for Cryptography & System Security
May-2016
Index
Q.1)
a) …………………………………………………………………………. 2 (N.A.)
b) …………………………………………………………………………. 2 - 3
c) …………………………………………………………………………. 3 - 4
d) …………………………………………………………………………. 5 – 6
Q.2)
a) …………………………………………………………………………. 6 (N.A.)
b) …………………………………………………………………………. 7 to 13
Q.3)
a) …………………………………………………………………………. 13
b) …………………………………………………………………………. 14 - 15
Q.4)
a) …………………………………………………………………………. 15 - 16
b) …………………………………………………………………………. 17 to 19
Q.5)
a) …………………………………………………………………………. 19
b) …………………………………………………………………………. 19 to 25
c) …………………………………………………………………………. 25 to 28
Q.6)
a) …………………………………………………………………………. 28 - 29
b) …………………………………………………………………………. 29 to 32
c) …………………………………………………………………………. 32 - 33
d) …………………………………………………………………………. 34
e) …………………………………………………………………………. 35 to 37
1 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.1) Attempt All (20)
a) Explain software flaws with examples.
Ans :- N.A.
b) List with examples the different mechanism to achieve security.
Ans :- Security Mechanisms
2 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
c) Explain with examples, keyed and keyless transposition ciphers.
Ans :-
3 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
4 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
d) Elaborate the steps of key generation using RSA algorithm. (05)
Ans :- RSA Algorithm
5 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.2)
a) A and B decide to use Diffie-Hellman algorithm to share a key. They chose p=23 and
g=5 as the public parameters. Their secret key that they share. (10)
Ans :- N.A.
6 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
b) Explain working of DES. (10)
Ans :- Data Encryption Standard
7 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Detail steps in DES :-
Initial Permutation (IP) :-
8 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Rounds :-
9 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
10 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Final Permutation :-
11 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Advantage of DES :-
Disadvantage in DES :-
Double Des :-
Triple DES :-
12 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.3)
a) What is access control? How does the Bell La padula module achieve access control.(10)
Ans :- The Bell-LA Padula Model (BLP)
13 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
B) What is Digital signature. Explain any digital signature algorithm in
detail.(10)
Ans :- Digital Signature
14 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.4)
a) Compare packet sniffing and packet spoofing. Explain session hijacking attack (10)
Ans :- Session Hijacking and Spoofing
15 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
16 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
b) Explain working of Kerberos. (10)
Ans :- Kerberos 5.0
17 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
18 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.5)
a) What is Firewall? What are the Firewall design principles? (05)
Ans :- Firewall
Design of Firewall :-
b) What are the various ways for memory and address protection.(05)
Ans :- Operating System Security
19 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
20 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
21 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
22 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
23 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
24 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
C) Explain the significance of an Intrusion Detection System for securing a network.
Compare signature based and anomaly based IDS. (10)
Ans :-
25 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
26 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
27 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
Q.6) Write short note on (Any Four) (20)
a) Email Security
Ans :-
28 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
b) SSL handshake protocol
Ans :- Working Of SSL
29 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
30 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
31 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
c) IPSec protocols for security.
Ans :- Security protocols :-
32 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
33 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
34 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
d) Denial of service attacks.
Ans :-
e) IDEA
Ans :-
35 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
36 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
37 |www.brainheaters.in
Mumbai University Computers ( Semester – VII )
38 |www.brainheaters.in