How To Exam?

a knowledge trading engine...


M.Sc-M.Sc Computer Science 3rd Sem CS - 23 - 303 : Information Systems Security(University of Pune, Pune-2013)

Friday, 28 November 2014 12:57Nitha

                                     M.Sc. (Semester - III)

                                          COMPUTER SCIENCE


SEAT No. :

[Total No. of Pages : 2


CS - 23 - 303 : Information Systems Security

(2008 Pattern)

Time : 3 Hours]                                                                                           [Max. Marks : 80

Instructions to the candidates :

1)      All questions are compulsory.

2)      All questions carry equal marks.

3)      Neat diagrams must be drawn wherever necessary.

Q1) Attempt all of the following :                                                             [8 × 2 = 16]

 

Define masquerade attack.

Discuss Homophonic substitution cipher.

What is use of IV in CBC mode?

Explain how birthday attack is used to detect collisions in message digest algorithms.

What are the problems with public key cryptography.

What are the applications of IPsec? Define the term steganography.

What is phishing?


Q2) Attempt any four of the following :                                                 [4 × 4 = 16]

a) Explain how 3-D secure protocol is used to provide security to the credit

card on the Internet?

b) Why internetwork security is called fascinating and complex?

c) Apply the vernam cipher algorithm to a plain text message “Hello John”

using a one time pad NCBTZQARX.

d) Discuss the advantages and disadvantages of ECB and OFB mode.

e) Given two prime numbers P = 7 and Q = 17. Find out N, E and D in an

RSA encryption process.

Q3) Attempt any four of the following :                                                 [4 × 4 = 16]

a) Explain the working of secure hash algorithm.

b) What are the broad level differences between CRL, OSCP and SCVP?

c) How key agreement and key distribution is handled in IPsec?

P.T.O.

d) When is a Demilitarized zone required? How is it implemented?

e) Explain how subkeys are generated in Blowfish algorithm.

Q4) Attempt any four of the following :                                                 [4 × 4 = 16]

a) Discuss the different types of intruders. Explain any one intrusion

detection mechanism.

b) Explain any one mutual authentication mechanism with its advantages

and drawbacks.

c) Discuss the working of handshake protocol used in SSL.

d) How does the one time initialization step works in AES?

e) What is key wrapping? How is it useful?

Q5) Attempt any four of the following :                                                 [4 × 4 = 16]

a) Explain the working of PEM.

b) Discuss the VPN architecture in detail.

c) A and B want to establish a secret key using Deffie Hellman key exchange

protocol. Assuming the values are N = 5, g = 13, x = 13, y = 9. Find out

the values of A, B, K1 and K2.

d) Discuss the various steps used in verification of digital certificate.

e) What are authentication tokens? Explain time based tokens.


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER M.Sc-M.Sc Computer Science 3rd Sem CS - 23 - 303 : Information Systems Security(University of Pune, Pune-2013)