Differenatiate substitution techniques and transposition techniques.
[3 marks]Describe Rail-Fence cipher algorithm with an example.
[4 marks]Explain Mathematical and Side-channel attacks in detail.
[7 marks]Differenatiate Block cipher and Stream cipher.
[3 marks]Explain sub bytes in AES algorithm.
[4 marks]Explain four different stages of AES structure.
[7 marks]Explain hoe DES algorithm observes Fiestel structure. Explain key generation and use of S-box in DES algorithm.
[7 marks]What do you mean by Confidentiality, Integrity and Availability.
[3 marks]What is web security? How can we achieve web security?
[4 marks]Explain the Transport Layer security in detail.
[7 marks]What are some key regulations that organization should consider when conducting a security audit?
[3 marks]List out the types of security Audit.
[4 marks]What are some common techniques used during Security audits?
[7 marks]Explain Cipher feedback mode of DES operation.
[3 marks]What are the weakness of ECB mode?
[4 marks]Explain RSA algorithm with suitable example.
[7 marks]How encryption is done using triple DES with two keys.
[3 marks]Discuss the Man in Middle attack.
[4 marks]Which principles should be keep in mind during the firewall design?
[7 marks]Explain Public key cryptosystems with applications.
[3 marks]Explain required property of Hash code.
[4 marks]Explain SHA algorithm in detail.
[7 marks]Explain counter mode of DES operation.
[3 marks]Write a short note on SSL.
[4 marks]Perform Encryption and Decryption using RSA algorithm for this: p=3; q=13; e=5; M=10. -------1
[7 marks]