SEC-B-1 Question Paper
SEC-B-1 Question Paper
SEC-B-1 Question Paper
b. What are the offences and penalties for section 66A and 66D under IT Act 2000? [4]
3. a. Use the Polyalphabetic cipher to encrypt the plaintext “BRUTE force ATTACK” with initial
key value as 10. Then decrypt the message to get the original plaintext. [6]
b. Use the Additive cipher with k = 10 to encrypt the plaintext “Hello World”. Then decrypt
the message to get the original plaintext. [4]
4. a. What are the different authentication mechanisms to confirm a user’s identity? [4]
b. How confidentiality and authentication are used in the same message in PGP? [6]
5. Suppose Alice wants to send some secret message to Bob, how does she maintain the
authentication and confidentiality? Use the conception of Public Key and Private Key. Draw
the conception of Digital Signature from that. [10]
b. Gmail and Facebook or any bank login required password, where the password gets
saved and how the exact procedure is maintained? Is there any chance of losing your
password through the organization? [5 + 5]
Note: Candidates must send their scanned answer scripts in a single pdf format
to the following mail id