Define provable security.
[3 marks]Explain Uncertainty/Entropy information measures.
[4 marks]Explain Shannon’s general secrecy system with block diagram. Q .2 (a ) Define Quantum Cryptography.
[3 marks]Explain concept of quantification of leakage and partition.
[4 marks]Write a short note on differential privacy.
[7 marks]Explain side channel attack in detail.
[7 marks]Explain unconditional security.
[3 marks]Mention various masking techniques and write short description of each.
[4 marks]List out various codes and discuss them in detail.
[7 marks]Explain light-weight cryptography in IOT context.
[3 marks]Draw a figure of Diffie-Hellman key exchange mechanism and explain each step.
[4 marks]Explain Shamir’s secret sharing algorithm with example.
[7 marks]Define secret sharing and its importance in network security.
[3 marks]Explain probability distribution in detail.
[4 marks]Briefly explain rate-distortion theory for secrecy systems.
[7 marks]What is Randomized Ciphers? Mention its applications and challenges.
[3 marks]Differentiate between uncertainty and risk for a probability distribution.
[4 marks]Explain Elliptic Curve Cryptography and its applications.
[7 marks]What is semantic security?
[3 marks]Differentiate between parity check code and cyclic code.
[4 marks]Discuss key concept, types, techniques and applications of Distributed channel synthesis.
[7 marks]Define network forensics.
[3 marks]Draw a diagram of encryption and decryption process in AES.
[4 marks]Write a short note on Public Key Infrastructure.
[7 marks]