Describe the term: Strong Secrecy, Authorization and Integrity.
[3 marks]List out various security measures for computer.
[4 marks]Explain Shamir’s Secret Sharing Algorithm with suitable example.
[7 marks]What are the different internet security threats?
[3 marks]Discuss LRC with suitable example.
[4 marks]Write a short note on Quantum Cryptography.
[7 marks]Explain Caesar Cipher with example.
[7 marks]Explain Elliptic Curve Cryptography?
[3 marks]What is Hamming Code?
[4 marks]Describe Digital Forensics in detail.
[7 marks]Explain perfect secrecy in the symmetric cipher model.
[3 marks]Explain Key Management in Cryptosystem.
[4 marks]What is linear block code? Explain in detail with suitable example?
[7 marks]Explain Different types of network forensics in brief.
[3 marks]Explain the difference between uncertainty and risk for a probability distribution.
[4 marks]Explain Passive Attack and its types.
[7 marks]What is Diffie-Hellman algorithm?
[3 marks]Explain rate distortion.
[4 marks]Explain Side channel attack
[7 marks]Explain Public Key Infrastructure.
[3 marks]Write down difference between cyclic code and linear code.
[4 marks]Write a short note on probability distribution.
[7 marks]Explain secret sharing and its importance in network security.
[3 marks]Comment on the importance of Digital Certificates.
[4 marks]Briefly explain perfect secrecy with One Time Pad using suitable example.
[7 marks]