Pune University BE (Computer Engineering) Information Security Question Papers

B.E. (Computer Engineering) INFORMATION SECURITY (2008 Pattern) (Elective-IV) (Sem. – II)

Time :3 Hours]                                                                                              [Max. Marks :100

Instructions to the candidates :-

1)            Answer any 3 questions from each section.

2)            Answers to the two sections should be written in separate books.

3)             Neat diagrams must be drawn wherever necessary.

4)             Pigures to the right indicate full marks.

5)            Assume suitable data, if necessary.

SECTION – I

QI) a) Explain OSI security architecture.                                                                          [6]

b)            Discuss in brief the “security life cycle”                                                         [6]

c)            Define an active attack Explain any two active attacks with example. [6]

OR

Q2) a) What is the need of Information security? Explain legal, ethical and professional issues associated with it.                                                             [8]

b) i) Construct a playfair matrix with the key largest.

i)              Construct a playfair matrix with the key occurrence. Make a reasonable assumption about how to treat redundant letters in the key.

ii)           Using the following playfair matrix encrypt this message.

[10]

“Must see you over Cadogan West. Coming at once.”

M

F H

I/J

K

U

N

O P

Q

z

V W X Y

E

L A R G

D

S T B C

 

Q3) a) What is the Feistel Cipher structure? Explain in detail.                                     [8]

b) Why RC 5 is suitable for smart card like devices? Explain the working of RC 5.            [8]

OR

P. TO.

Q4) a) Explain IDEA algorithm in detail. Enlist its strengths.                                      [8]

b) What is block cipher? Explain the various block cipher modes of operations.      [8]

Q5) a)

Explain the Elliptic Curve Cryptography (ECC) DIFFIE-HELLMAN

 

algorithm.

[8]

b)

Explain the RSA public-key encryption algorithm with example.

[8]

 

OR

 

Q6) a)

Describe key-distribution in Cryptosystem.

[8]

b)

What is field? Define and explain with example.

[8]

 

SECTION – II

 

Q7) a)

Why MAC is needed? What are the requirements of MAC function?

 

Explain MAC function in detail.

[10]

b)

Describe the purpose, format and use of x.509 digital Certificates.

[8]

 

OR

 

Q8) a)

Explain Birthday-Paradox and Birthday attack on Hash functions. Discuss

 

strengths of SHA-I against birthday attacks.

[10]

b)

Give HMAC design objectives and explain the HMAC algorithm.

[8]

Q9) a)

Explain the IPSEC Services and authentication header.

[8]

b)

What is SSL protocol stack? Explain the SSL Record format and SSL

 

record protocol operations.

[8]

 

OR

 

Q10) a)

Describe the various configurations for firewall.

[8]

b)

How TLS is different than SSL? Explain in detail.

[8]

Q11A a)

Explain the web-trust model used in PGP. Which certificates are used in

 

PGP?

[8]

b)

Describe the web and email security considerations.

[8]

OR

 

Q12)a) Explain the message/ content types in S/MIME.                                               [8]

b)            What is dual signature? How it is used in SET (Secure Electronic Transaction).        [8]

 

1 thought on “Pune University BE (Computer Engineering) Information Security Question Papers”

Leave a Comment