Explain Caesar Cipher technique with Example.
[3 marks]Explain with example any two principles of Security.
[4 marks]Define the following terms related to Information Security: i. Cryptography ii. Cryptanalysis iii. Sniffing iv. Spoofing v. Interception vi. Fabrication vii. Masquerade
[7 marks]Differentiate between Block Cipher and Stream Cipher.
[3 marks]Explain One-Time Pad Substitution technique with the help of example.
[4 marks]Explain in detail single round of DES algorithm.
[7 marks]Explain in detail single round of AES algorithm.
[7 marks]What is meet in the middle attack?
[3 marks]Explain Electronic Code Book and Cipher Block Chaining Mode in detail.
[4 marks]In a Diffie-Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is the secret key they exchanged? Explain it with proper steps.
[7 marks]Define Hash function in Cryptographic and list its application.
[3 marks]Differentiate between Symmetric key cryptography and Asymmetric key cryptography.
[4 marks]Explain RSA algorithm with example in detail.
[7 marks]What is MAC? State the main difference between MAC & Hash function.
[3 marks]Explain hill cipher algorithm with example.
[4 marks]Explain Message Digest Generation Using SHA-512.
[7 marks]Explain the types of attacks are addressed by message authentication?
[3 marks]What are the requirements for a Cryptographic Hash Function?
[4 marks]Explain with the diagrams Basic Uses of Message Authentication code (MAC).
[7 marks]What is the role of Key Distribution Centre? Give the several techniques for the distribution of public keys.
[3 marks]Give the difference between Session key and Master key.
[4 marks]Explain with neat diagram Digital Signature Algorithm. OR1
[7 marks]What is the role of AS and TGS in Kerberos?
[3 marks]Draw X.509 certificate format.
[4 marks]Explain SSL Architecture with neat diagram.2
[7 marks]