CSS- Semester 6
CSS- Semester 6
10 Markers
i) What is need for message authentication? List various techniques used for
message authentication. Explain any one.
ii) Use Hill cipher to encrypt the text "short". The key to be used is hill.
iii)
2. Symmetric and Asymmetric key Cryptography and key Management
A. What are properties of hash function? Explain role of hash function in security
10 Markers
a. What characteristics are needed in secure hash function? Explain secure
hash in secure hash algorithm on 512 bit.
b. Provide a comparison between HMAC, CBC-MAC and CMAC.
c. What goals are served using a message digest? Explain using MD5.
10 Markers
(1) What is digital certificate? How does it help to validate authenticity of a user.
Explain X.509 certificate format.
(2) Discuss various attacks on digital signatures and the methods by which they
can be overcome
(3) Elaborate the sign and verification process of RSA as a digital signature scheme.
(4) How does ESP header guarantee confidentiality and integrity of packet
payload? What is an authentication header (AH)? How does it protect against
replay attack?
(5)
(6) Why are digital certificates and signatures required? What is the role of digital
signature in digital certificates? Explain any one digital signature algorithm. * 2
(7) What is the need for message authentication? List various techniques. used for
message authentication. Explain any one of them.
(8) Elaborate the steps of key generation using the RSA algorithm. In RSA system
the public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private
key ‘D’. What is the cipher text for M=10 using the public key.
(9)
5. Network Security and Applications
6. System Security
A. Explain buffer overflow attack.*3
SQL injection