CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE JAN2016 ASSESSMENT_CODE MIT4022_JAN2016 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297062 QUESTION_TEXT Discuss various criteria used in the final NIST evaluation of Rijndael. Criteria are: SCHEME OF EVALUATION 1. General Security 2. Software Implementation 3. Restricted-space Environment 4. Hardware Implementation 5. Attacks on implementations 6. Encryption versus Decryption 7. Key agility 8. Versatility and Flexibility 9. Potential for Instruction level parallelism --- 10 marks QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297063 QUESTION_TEXT Explain RSA algorithm in detail. RSA algorithm: SCHEME OF EVALUATION Different steps are: i) Key generation ii) Encryption iii) Decryption Explanation required (6+2+2=10 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297064 QUESTION_TEXT Discuss Digital Signature algorithm. Various steps are: i) Global public key components ii) Users Private key iii) Users Public key SCHEME OF EVALUATION iv) Users Per-Message Secret number v) Signing vi) Verifying Explanation required 3+1+1+1+2+2=10 marks QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297067 QUESTION_TEXT Explain the various security services as recommended by X.800. Each service carries 2 marks SCHEME OF EVALUATION Authentication Access control Data confidentiality Data integrity Non repudiation QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297068 QUESTION_TEXT Explain about packet filters. Explanation – 2 ½ marks Advantages – 2 ½ marks Weakness – 2 ½ marks Counter measures – 2 ½ marks SCHEME OF EVALUATION QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297074 QUESTION_TEXT Explain any five applications and benefits of IPSec. SCHEME OF EVALUATION Applications – 5 marks ● Secure branch office connectivity over the internet ● Secure remote access over the internet ● Establishing extranet and intranet connectivity with partners ● Enhancing electronic commerce security Benefits – 5 marks ● It provides strong security that can be applied to all traffic crossing the perimeter ● IP It is resistant to bypass if all traffic from the outside must use ● Is below the transport layer and so is transparent to applications ● Can be transparent to end users ● Can provide security for individual users if needed