List and explain different types of attacks.
[3 marks]Explain Caesar cipher algorithm with the help of example.
[4 marks]List and explain different mode of operation used for encryption and decryption.
[7 marks]List use of public key cryptography
[3 marks]Write steps for sub key generation in DES
[4 marks]Explain DES encryption.
[7 marks]List and explain possible attacks on DES.
List requirements of public key cryptography.
[3 marks]How same key can be calculated in diffi hellman key exchange algorithm.
[4 marks]Explain key generation of RSA algorithm
[7 marks]Write Euclid algorithm.
[3 marks]Discuss security of diffi hellman key exchange algorithm.
[4 marks]Write down the algorithm used for calculation exponentiation efficiently. Also give example.
[7 marks]What is authentication? How can we implement message authentication?
[3 marks]List and explain requirements of secure hash function
[4 marks]List basic uses of Hash function.
[7 marks]Define weak collision resistance and strong collision resistance.
[3 marks]Draw message digest generation using SHA 512 algorithm.
[4 marks]Explain message authentication based on DES.
[7 marks]Define Mutual authentication with example.
[3 marks]How public key cryptography can be used for Digital signature? Explain.
[4 marks]Draw and explain DSS approach for digital signature.
[7 marks]List and explain various key distribution approach of symmetric key cryptography.
[3 marks]Discuss the security of digital signature.
[4 marks]What is replay attack? How can we avoid this attack using digital signature?
[7 marks]