Define following: i. Cryptography ii. Sniffing iii. Spoofing.
[3 marks]Encrypt the following message using playfair cipher. Text: “you keep smiling” and security Keyword: “happiness”.
[4 marks]List and explain various types of attacks on encrypted message.
[7 marks]What is the purpose of S-boxes in DES?
[3 marks]Explain encryption and decryption of RSA algorithm.
[4 marks]DES algorithm is secure or not. Justify your answer.
[7 marks]Explain in detail single round of AES algorithm.
[7 marks]What are the problems with one-time pad? Explain with suitable example.
[3 marks]Distinguish between passive and active security attacks.
[4 marks]Explain Diffie-Hellman algorithm with suitable example. What are the limitations of Diffie-Hellman algorithm?
[7 marks]Differentiate Stream cipher and block cipher.
[3 marks]What is the limitation of Electronic Codebook Mode (ECB)? How it is overcome by Cipher Block Chaining (CBC) mode.
[4 marks]What do you mean by key distribution? Give at least one method for key distribution with proper illustration.
[7 marks]Discuss Man-in-the-Middle Attack.
[3 marks]Explain rail fence Cipher technique.
[4 marks]Explain Message Digest Generation Using Secure Hash Algorithm (SHA).
[7 marks]Discuss Meet-in-the-Middle Attack.
[3 marks]Explain the triple DES scheme with two keys with suitable diagram.
[4 marks]Explain with the diagrams Basic Uses of Message Authentication code (MAC).
[7 marks]What is the role of AS and TGS in Kerberos?
[3 marks]Give the difference between Session key and Master key.
[4 marks]Explain NIST Digital signature algorithm
[7 marks]Explain authentication mechanism of Kerberos.
[3 marks]Write a short note on Pretty Good Privacy (PGP).
[4 marks]Explain SSL Architecture with neat diagram.
[7 marks]