What are the key principles of security?
[3 marks]Differentiate between cryptography and steganography.
[4 marks]What is cryptanalysis? Explain 5 techniques of how attackers can launch attacks. 0
[7 marks]What would be the transformation of a message ‘Happy Birthday to you’ using Rail 0 Fence technique level =3?
[3 marks]What is the idea behind meet-in-the-middle attack?
[4 marks]Explain the steps in the various rounds of DES.
[7 marks]Explain the steps in the various rounds of AES.
[7 marks]What is an Initialization Vector(IV)? What is its significance?
[3 marks]Generate a Cipher text for plain text ‘ACT’ with key ‘GYBNQKURP’ using hill cipher.
[4 marks]Explain RSA algorithm and also compute public key and private key of RSA with p- 53, q=59 and e = 3.
[7 marks]Differentiate between diffusion and confusion with example
[3 marks]Generate a Cipher text for plain text ‘MISSION’ with key ‘IMPOSSIBLE’ using playfair cipher.
[4 marks]Explain the Deffie Hellman key exchange algorithm in detail. In a Diffie Hellman Key Exchange, Alice and Bob have chosen prime value 11 and 7. If Alice’s secret key is 3 and Bob’s secret key is 6, what is the secret key they exchanged?
[7 marks]Differentiate between Session key and Master key.
[3 marks]Why is SHA more secure than MD5?
[4 marks]Discuss X.509 Certificates.
[7 marks]What are the common causes for revoking a digital certificate?
[3 marks]What is the difference between MAC and message digest?
[4 marks]Discuss Secure Hash Algorithm (SHA)
[7 marks]Explain the following properties of hash function (i) One way property (ii) Weak collision resistance
[3 marks]Name the four key steps in the creation of a digital certificate.
[4 marks]Discuss the working of KERBEROS authentication protocol.
[7 marks]What are the three aspects of a 3-factor authentication?
[3 marks]What is KDC? With the help of diagram explain how KDC do key distribution.
[4 marks]Discuss Digital signature algorithm.
[7 marks]