CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
JAN2016
ASSESSMENT_CODE MIT4022_JAN2016
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297062
QUESTION_TEXT
Discuss various criteria used in the final NIST evaluation of
Rijndael.
Criteria are:
SCHEME OF
EVALUATION
1.
General Security
2.
Software Implementation
3.
Restricted-space Environment
4.
Hardware Implementation
5.
Attacks on implementations
6.
Encryption versus Decryption
7.
Key agility
8.
Versatility and Flexibility
9.
Potential for Instruction level parallelism
--- 10 marks
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297063
QUESTION_TEXT
Explain RSA algorithm in detail.
RSA algorithm:
SCHEME OF EVALUATION Different steps are:
i)
Key generation
ii)
Encryption
iii)
Decryption
Explanation required (6+2+2=10 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297064
QUESTION_TEXT
Discuss Digital Signature algorithm.
Various steps are:
i)
Global public key components
ii)
Users Private key
iii)
Users Public key
SCHEME OF EVALUATION iv)
Users Per-Message Secret number
v)
Signing
vi)
Verifying
Explanation required
3+1+1+1+2+2=10 marks
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297067
QUESTION_TEXT
Explain the various security services as recommended by
X.800.
Each service carries 2 marks
SCHEME OF
EVALUATION

Authentication

Access control

Data confidentiality

Data integrity

Non repudiation
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297068
QUESTION_TEXT
Explain about packet filters.

Explanation – 2 ½ marks

Advantages – 2 ½ marks

Weakness – 2 ½ marks

Counter measures – 2 ½ marks
SCHEME OF EVALUATION
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297074
QUESTION_TEXT
Explain any five applications and benefits of IPSec.

SCHEME OF
EVALUATION
Applications – 5 marks
●
Secure branch office connectivity over the internet
●
Secure remote access over the internet
●
Establishing extranet and intranet connectivity with partners
●
Enhancing electronic commerce security

Benefits – 5 marks
●
It provides strong security that can be applied to all traffic
crossing the perimeter
●
IP
It is resistant to bypass if all traffic from the outside must use
●
Is below the transport layer and so is transparent to
applications
●
Can be transparent to end users
●
Can provide security for individual users if needed
Download