PART–A (22 Marks)
- a) What is meant by buffer overflow? [4] b) Explain Cipher Block Chaining Mode. [4]
- What is Eulers Totient function? Find it for 37 and 21. [4]
- What is data authentication code? [3]
- List the transfer encodings used by S/MIME. [4]
- What is meant by packet sniffing? [3]
PART–B (3x16 = 48 Marks)
- a) Explain the operations, requirements, components of Network security model. [8] b) What is TCP Session Hijacking? How is it done? [8]
- a) Give a detailed description of key generation and encryption of IDEA algorithm [8] b) Explain about CAST-128 encryption algorithm. [8]
- a) What is discrete logarithm? What are their properties? [8]
- b) Using RSA algorithm, Find n, d if p=11, q=3, e=3. Encrypt “HelloWorld”
Message. [8]
- a) Describe HMAC algorithm. Comment on the security of HMAC. [8] b) Describe signing and verification in Digital Signature Algorithm. [8]
- a) Write about the usage of session keys, Public and Private keys in PGP. [8] b) Give the structure of PGP message generation. Explain with a diagram. [8]
- a) What is meant by Transport mode and tunnel mode? How is authentication
header implemented in these two modes? [8] b) What is rule based Intrusion Detection? [8]
1 of 1
PART–A (22 Marks)
- a) What is the web based attacks? [3] b) What are the disadvantages of double DES? [4]
- State Euler’s Theorems. [3]
- What is meant by one-way property in hash function? [4]
- What is the problem that kerberos addresses? [4]
- What is meant by intrusion detection system? [4]
PART–B (3x16 = 48 Marks)
- a) Differentiate between passive attacks and active attacks. [8] b) Discuss about TCP session hijacking and UDP hijacking. [8]
- a) Describe Triple DES and its applications. [8] b) Discuss in detail about Blowfish. [8]
- a) Describe RSA Algorithm and Estimate the encryption and decryption values for
the RSA algorithm parameters. [8]
- State the Chinese Remainder Theorem and find X for the given set of congruent
equations X≡2 mod 3, X≡3 mod 5 and X≡2 mod 7. [8]
- a) What are the types of attacks addressed by message authentication? What are two
levels of functionality that comprise a message authentication or digital signature mechanism? [8]
- Explain the process of deriving eighty 64-bitwords from 1024 bits for processing
of a single blocks and also discuss single round function in SHA-512 algorithm.
Show the values of W16, W17, W18 and W19. [8]
- a) How does PGP provide authentication and confidentiality for email services and for file transfer applications? Draw the block diagram and explain the [8]
- Analyze the Cryptographic algorithms used in S/MIME and Explain S/MIME
certification processing. [8]
- a) Explain IP Security protocols in detail. [8] b) Write short notes on Signature based IDS. [8]
1 of 1