Friday, August 20, 2010

Network Security



Network Security Test 1-2010

Part A

1 a) Describe the various attacks on Security in a network                             -5-
   b) Write a playfair matrix with the key word  “WALKING”. Use it to
       encipher the message “SUPPORT NEEDED URGENTLY”. If needed
       use a dummy character.                                                                             -5-

2a) In S-DES the S-Box design is given as
1
0
3
2
3
2
1
0
0
2
1
3
3
1
3
2
0
1
2
3
2
0
1
3
3
0
1
0
2
1
0
3


 S0  =                                                            S1=
                                                                         



     Find the output of the S-Box for the combination 1101 and 1000 given
      to S0 and S1 respectively.                                                                              -5-
b) Explain the cipher feedback mode of using DES .                                        -5-

Part B

3a) Give the differences between.
(i)   Differential and Linear Cryptanalysis.
(ii)  Monoalphabetic and Polyalphabetic cipher .                                             -5-
b) In a RSA system the public key of a user is e = 31, n = 3599.
     What is the private key of the user.                                                            -5-

4a) Write down the RSA algorithm.                                                                -5-
b) Perform double transposition technique to decipher the text
        I R I X A T L T N H  Y E I S S T S E V E A T Y  R  S E N X
                The Key is   4 3 1 2 5 6 7                                                                -5-

Part C

5) Explain in detail the S-DES encryption with a block diagram and
      describe all the steps .                                                                             -5-
6) Explain with a block diagram a single round of DES algorithm
    in detail.                                                                                                     -5-

**************************************************************************

Network Security Test 2-2010
Part A:

1a) Explain with block diagrams the public-key cryptosystem to provide
            (i) Secrecy
            (ii) Authentication
            (iii) Secrecy and Authentication.                                                                           -5-

b) Perform encryption and decryption using RSA for the following
            p=17, q=31, e=07, M=2.                                                                                    -5-

2a) Consider a Diffie-Hellman scheme with common prime q=11 and a primitive root  α=2    (i) Show that 2 is a primitive root of 11
           (ii) If user A has a public key YA=9. What is A’s private key XA?
           (iii) If user B has a public key YB =3, what is the shared secret key K?            -5-

b) With neat diagrams explain the basic uses of hash function.                                   -5-

Part B:

3a) Explain with neat diagrams SSL Architecture, Session state and Connection state.
                                                                                                                                         -5-                               

b) What are the services offered by SSL Record Protocol. Explain the operation with a diagram. Also show the SSL record Format.                                                                -5-

4a) Explain with a neat diagram the 4 phases of the handshake protocol.                    -5-

b) Write the sequence of events for secure electronic transaction                               -5-

Part C:

5) The given Plain text is PAY MORE MONEY. Find the Cipher text in Hill Cipher -5-

6) Given cipher text is PQCFKU. Find the plain text using Hill Cipher .                      -5-


********************************************************************************************

Network Security Test 3-2010
Part A


1a) How are passwords stored and verified? Explain the process with a
      neat diagram.                                                                                 -5-

b) What are the uses of audit records? Explain the different types with
      examples.                                                                                      -5-

2a) What are the metrics used for profile based intrusion detection?   
                                                                                                            -5-
b) Write the examples of heuristics which are used to assign degrees of
     suspicious  activities                                                                      -5-

Part B

3a) What is the current state of worm technology                                 -5-

  b) Give the general structure of virus and explain how it works         -5-

4a) Explain the following: (1) Macro Virus
                                            (2) Email Virus                                          -5-
b) How does compression virus infect a program                                 -5-

Part C

5) What are the advanced antivirus techniques  Explain with diagram the
     digital immune system                                                                      -5-

6) What are the strategies for password selection so that password is not    
     easily guessable                                                                                 -5-
                                                                                                                                        
************************************************************




No comments:

Post a Comment