Professional Documents
Culture Documents
2008-2009
(a) Define the three security goals. Distinguish between passive & active attacks with suitable examples.
(b) Distinguish between :
(i) Substitution Cipher & Transposition Cipher.
(ii) Stream Cipher & Block Cipher.
(c) A Small private club has only 100 members. Answer the following questions:
(i) How many secret keys are need if all the members of the club need to send secret messages to
each other.
(ii) How many secret keys are needed if everyone trusts the president of the club? If a member
needs to send a message to another member, she first sends it to the president & the president
sends this message to the other members.
(d) What is Shannon’s theory of confusion and diffusion? Which parameters and choices determine the
actual algorithm of fiestel cipher?
(e) How does meet-in-the-middle attack improve the vulnerability in double DES? What are the
advantages of implementing Triple DES with two keys?
(f) Explain why modes of operation are needed if modern block ciphers are to be used for
encipherment. Show why CFB mode creates a non synchronous stream cipher, but OFB mode
creates a synchronous one.
(a) (i) What is digital signature? Show how RSA can be used for performing digital Signature.
(ii) Define any two birthday problems. Associate each birthday problem with one of the attacks
on Hash Function.
(b) (i) Compare and contrast symmetric and asymmetric key cryptography. How the best can be taken
from both the combined to give a better solution?
(ii) Discuss how different steps of SHA produce a message digest.
(c) Discuss mutual authentication and one-way authentication protocols. How do they deal with the
replay attacks?
(a) What are the typical contents in X.509 certificate format? State the purpose of different fields of
certificate revocation list (CRL). What is the delta revocation?
(b) Why do we need the Kerberos authentication protocol? Discuss the roles of authentication server,
ticket-granting server and the real server. State the interaction of client with the different servers to get
the service of real server.
(a) State the purpose of each field of authentication header and encapsulating security payload protocols
of IPSec. Discuss the idea of security association.
(b) Why is the SSL layer positioned between the application layer and the Transport layer? Discuss the
following sub-protocols of SSL:
(i) Handshake protocol.
(ii) Record protocol.
(iii) Alert protocol.
(c) What is a firewall? Discuss its different types and the possible configurations.
CRYPTOGAPHY & NETWORK SECURITY
2009-2010
3 2
K=
5 7
Obtain the decryption key to be used for deciphering the cipher text.
(a) Describe in brief IDEA encryption and decryption. Also explain how can we generate
cryptographically secure pseudorandom numbers?
(b) Explain the following :
(i) MAC (Message Authentication Code)
(ii) HMAC (Hash based Message Authentication Code)
(c) Explain the Blowfish cryptographic algorithm. Also differentiate between differential and linear
cryptoanalysis.
(a) Why the middle portion of the Triple DES is used in a decryption rather than encryption?
Discuss the strength of DES algorithm and also explain the substitution method including the P-
Box?
(b) Explain the Euler’s Coefficient function. State and prove Fermat’s Theorem.
(c) Explain RSA algorithm. Perform encryption and decryption using RSA algorithm for p = 17,
q =11, e = 7, M = 88.
(a) Explain the Pretty God Privacy (PGP) algorithm. List various services supported by PGP.
(b) Given that the First 16 bits of the 128 bit message digest in a PGP signature are translated in the
clear. Explain to what extent this compromises the security of the hash algorithm.
(c) What do you understand by Elgamel encryption system? Explain its encryption and decryption?
What do you understand by Digital Signatures?
5. Attempt any two parts:
(a) What is Kerberos? Discuss Kerberos version 4 in detail. What is S/MIME and its main
functions?
(b) What are typical phases of an operation of a virus or worm and how does the behaviour blocking
S/W work?
(c) Give the format of X.509 certificate showing the important element of the certificate. Explain
the format.