Explain types of Security Attacks.
[7 marks]Explain Diffie - Hellman key exchange algorithm. Also explain Man-in-Middle attack with example.
[7 marks]Explain conventional security model used for information security.
[7 marks]17 Encrypt Message "Secure" using Hill Cipher with key [ ]2319
[7 marks]Encrypt the given message using playfair cipher. Message : GOOD MORNING Key : GTU EXAMS
[7 marks]Compare Symmetric Key Algorithm with Asymmetric Key Algorithm.
Explain Data Encryption Standards Algorithm with diagram.
[7 marks]Explain Modes of Algorithm.
[7 marks]Explain SHA-512 Algorithm.
[7 marks]List & Explain various key management techniques.
[7 marks]Explain concept of Dual Signature in SET.
[7 marks]What is SSL? Explain SSL Handshake & Record Protocol.
[7 marks]Explain Authentication mechanism of Kerberos.
[7 marks]What are the five services principal services provided by PGP? Explain in detail.
[7 marks]Explain Digital Signature. Also explain its use with the help of example.
[7 marks]Explain IP Sec with its benefits.
[7 marks]What are the characteristics of hash function? Also explain basic techniques of hash algorithm.
[7 marks]