Explain cryptanalytic attacks with example of any encryption algorithm.
[3 marks]Distinguish between Symmetric encryption and Asymmetric encryption using suitable example.
[4 marks]Explain the VERNAM Cipher method.
[7 marks]Explain data confidentiality, data authentication and data Integrity.
[3 marks]Explain the difference between diffusion and confusion.
[4 marks]Explain how DES (Data Encryption standard) algorithm observes Fiestel structure. Explain single round in detail.
[7 marks]Explain playfair cipher with example.
[7 marks]Explain the process of key generation in DES.
[3 marks]List out the various web security threats.
[4 marks]Explain Cipher Feedback (CFB) and Output Feedback mode (OFB) block cipher modes of operation with the help of diagram
[7 marks]Differentiate between hashing and encryption.
[3 marks]Elaborate AES encryption with neat sketches.
[4 marks]Explain Hash functions based on Cipher Block Chaining
[7 marks]What is Security audit?what is the need of security audits??
[3 marks]Explain triple DES with two keys.
[4 marks]Write a detailed note on SSL architecture and protocol.
[7 marks]How does secure socket layer protocol work?
[3 marks]Explain Intrusion Detection Systems.
[4 marks]Explain Types of Security Audits.
[7 marks]Discuss HASH function and its application in Crypto System.
[3 marks]Explain the following properties of hash function
[4 marks]One way property (ii) Weak collision resistance
[ marks]Discuss Diffie-Hillman key exchange algorithm in detail.
[7 marks]Discuss Man-in-the-Middle Attack
[3 marks]Discuss Secure Hash Algorithm (SHA)
[4 marks]Explain RSA algorithm in detail with suitable example. -------1
[7 marks]