Trending ▼   ResFinder  

Pune University - Sem - III : Information Systems Security, April 2010

2 pages, 28 questions, 0 questions with responses, 0 total responses,    0    0
pune_sci
  
+Fave Message
 Home > pune_sci >

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Total No. of Questions :5] [Total No. of Pages : 2 P1066 [3733]-303 M.Sc. COMPUTER SCIENCE CS -303 : Information Systems Security (Old & New Course) (Sem. - III) Time :3Hours] [Max. Marks : 80 Instructions to the candidates: 1) All questions are compulsory. 2) All questions carry equal marks. 3) Neat diagrams must be drawn wherever necessary. 4) Assume suitable data, if necessary. Q1) Attempt all of the following : a) Explain meet-in-middle attack. b) What is algorithm modes? State four algorithm modes. c) What is cross certification? d) Differentiate between authentication and authorization. e) What is stenography? Give an example. f) State e-mail related crimes. g) What is mean by delta - CRL? h) [8 2 = 16] What is mean by message digest? Explain collision. Q2) Attempt any four of the following : [4 4 = 16] a) Explain working of RC-5 with suitable example. b) Write a note on Blowfish. c) Explain key generation and management using RSA. d) Explain working of HMAC. e) Explain how PGP provides authentication as well as confidentiality? P.T.O. Q3) Attempt any four of the following : [4 4 = 16] a) Write a note on VPN architecture. b) Explain approches for achieving SSO. c) Alis and Bob want to establish a secret key using Deffie Hellman key exchange protocol. Assuming the values are n = 10, g = 3, x = 5, y = 11. Find out values of A, B, K1 & K2. d) How challenge/responce tokens are used for authentication? e) Explain the processes of generating digital signature using RSA. Q4) Attempt any four of the following : [4 4 = 16] a) Explain 3-D secure protocol. b) What is intruder? Explain different types of intruders. c) Consider plain text alphabet D. Using RSA algorithm and value of public key P = 5, E = 3, Q = 11. Find out the private key & cipher text. d) Explain digital Immune system for virus protection. e) Describe how master secret is created from pre-master secret in SSL. Q5) Attempt any four of the following : [4 4 = 16] a) Write a note on SHA. b) What are the services provided by IP Sec? c) Explain broad level steps in PEM. d) Explain key transformation process by DES. e) What is electronic money? Discuss the types of electronic money. OR #### [3733]-303 2

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : M.Sc. COMPUTER SCIENCE, CS -303 : Information Systems Security ( New & Old Course) (Semister - III), Pune University
Tags : msc computer science pune university, msc computer science pune exam papers, Information Systems Security, pune university exam papers, university of pune question papers, pune university science, pune university courses, bsc pune university, msc pune university, pune university solved question papers, pune university model question paper, pune university paper pattern, pune university syllabus, old question papers pune university  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

pune_sci chat