N. B.: (1) All questions are compulsory. (2) Make suitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together. (4) Numbers to the right indicate marks. (5) Draw neat labeled diagrams wherever necessary. (6) Use of Non-programmable calculators is allowed. 1. a. b. c. d.
Attempt any two of the following: Write a short note on Cryptanalysis. Explain EIGamal signature scheme. What are their limitations? Explain model for Network security. What are benefits of IPSec?
2. a. b. c. d. e. f.
Attempt any three of the following: Explain Euclidean algorithm. Explain Huffman Encodings with example. Explain working of the Vigenere Cipher with an example. What are various mode of operation in DES? Explain any one in detail. Explain RSA Algorithm? Describe AES with example.
3. a. b. c. d. e. f.
Attempt any three of the following: What do you mean by Undeniable signature? Explain working of time stamping with application. Describe Hash function. Write a short note on Blom’s scheme. Explain MTI key agreement protocol. Explain in detail Diffie – Hellman key exchange algorithm.
4. a. b. c. d. e. f.
Attempt any three of the following: Write as short note on security trends. What is OSI security architecture? Explain various categories of security services. Explain Active attacks & Passive attacks. What are categories of Security mechanism? Define & Explain Computer security concept.
5. a b c d e f
Attempt any three of the following: What are the various web security protocols? Explain public key infrastructure. Also write its components? Explain x.509 authentication service? Write short note on Kerberos? What is S/MIME? What are principal services provided by PGP?
[Turn Over] 62320
Page 1 of 2
6. a. b. c. d. e. f.
Attempt any three of the following: Explain various services provided by IPSec. Explain ESP packet format. What are the advantages of IP security? Write difference between SSL connection and SSL session. What is concept of Handshake protocol in secure socket layer? Explain the objectives of Set protocol.
7. a. b. c. d. e. f.
Attempt any three of the following: List and explain component of viruses. Explain advantages of packet filters. Explain the role of intruders. What are limitations of Firewall? 5marks What are circuit level gateways? Also write it’s advantages. How to protect computer against Virus. _______________________