Explain the Following terms:
[7 marks]Message Confidentiality ii) ii) Message Integrity iii) Message Authentication iv) iv) Non Repudiation
[ marks]v) Denial of Service vi) vi) Symmetric Encryption vii) vii) Cryptanalysis
[ marks]1. Explain working of CBC and CFM cipher block modes of operations with diagram. 2. Explain the Fiestel Cipher Structure with suitable diagram.
[3 marks]1. Explain Diffie-Hellman key exchange with highlighting the need of it. 2. Explain the HMAC algorithm with diagram.
[3 marks]1. Explain any four differences between Kerberos version 4 and Kerberos version 5. 2. Explain X.509 Authentication Procedures in brief.
[3 marks]1. Explain the Public Key Infrastructure X.509 architecture model. 2. Explain Nonce; Ticket; Authenticator with respect to Kerberos.
[3 marks]Draw the SSL Protocol Stack. Explain the SSL handshake protocol.
[7 marks]1. What is a Security Association? What are the three parameters that uniquely identify it? 2. Differentiate between transport and tunnel modes of IPSec
[3 marks]What is SSH? Explain in brief the three protocols of SSH.
[7 marks]1. Explain the Anti-Replay Service ESP? 2. Why is R-64 conversion is useful for an email application? 3. What does the ChangeCipherSpec protocol do? 01
[2 marks]1. What are the basic building blocks of an 802.11 WLAN? 2. What security areas are addressed by IEEE 802.11i?
[3 marks]Explain the four services provided by PGP along with suitable diagram.
[7 marks]What is IPSec? What are the applications of IPSec? Explain the modes of IPSec operations.
[7 marks]1. What is the difference in message authentication code calculation process in SSL and TLS? 2. What is the role of function P_hash() in TLS? Page 1 of
[2 marks]1. Write any two methods of learning passwords. 2. What are honey pots? How they help learning about attacker activities? 3. What is proactive password checking? Why it is better than other password checking techniques?
[3 marks]Briefly explain the following terms: 1. Key rings in PGP 2. Password selection strategies (any one)
[3 marks]1. Which are the benefits of IDS? Write the principle on which the Intrusion detection is based. 2. What is an Audit record in IDS. 3. What is Salt in password management
[2 marks]Explain how attacks like IP address spoofing, source routing and tiny fragments can be carried out on packet filtering routers? What are the counter measures? Page 2 of
[2 marks]