Explain data confidentiality ,data authentication and non-repudiation
[7 marks]What is cryptography? Briefly explain the model of Asymmetric Cryptosystem
[7 marks]Explain monoalphabetic cipher and polyalphabetic cipher by giving an example.
[7 marks]List various modes of operations of block cipher. Explain any three of them briefly. OR
[7 marks]What is the purpose of S-box in DES? Explain the avalanche effect in DES.
[7 marks]What is the limitation of Electronic Codebook Mode (ECB)? explain CBC mode in detail.
[7 marks]Explain public-key cryptosystem in detail.
[7 marks]Explain Rail fence Cipher technique.
[7 marks]Describe MD5 message digest algorithm. What is message authentication code? What are the requirements for MACs?
[7 marks]07
[ marks]BBrriieeffllyy dexispcluasins MDiAffCie -bHaseelldm oann DkeEyS e. xchange. Is it vulnerable to man in the middle attack? Justify.
[7 marks]What characteristics are needed in secure hash function? Explain the concept of simple hash function.
[7 marks]What is authentication? How it can be done using cryptography?
[7 marks]Explain the general format of PGP(Pretty Good Privacy) message
[7 marks]What are the requirements of digital signature? Explain the concept of07 arbitrated digital signature.
[ marks]Explain SSL architecture.
[7 marks]What problem was Kerberos designed to address? Briefly explain how session key is distributed in Kerberos.
[7 marks]