1. Explain any three challenges of computer security. (3) 2. Explain a model for network security in detail. (4)
[7 marks]1. Explain the use of random and pseudorandom numbers in encryption. (5) 2. Write any two advantages of counter mode. (2)
[7 marks]What is the need of hash function? Explain steps of SHA-512 algorithm with suitable diagram.
[7 marks]Explain RSA public key cryptography algorithm taking suitable example. Show encryption and decryption process for example.
[7 marks]Explain AES symmetric encryption algorithm in detail with suitable diagram.
[7 marks]1. Explain KDC and its operations. (4) 2. Explain the role of TGT, TGS and AS with respect of kerberos V4. (3)
[7 marks]Explain SSL record protocol in detail with suitable diagram.
[7 marks]1. Explain the use of public key certificates. (2) 2. Explain X.509 V2 certificates in detail. (5)
[7 marks]Explain pseudorandom function and cryptographic computations for TLS with suitable diagram.
[7 marks]Explain 802.11 protocol architecture in detail using suitable diagram.
[7 marks]Explain the two reasons to grow PGP explosively. (2) Explain confidentiality and authentication operation of PGP using suitable diagram. (5)
[7 marks]Explain ESP packet format in detail using suitable diagram.
[7 marks]Explain different fields associated in general format PGP message with diagram.
[7 marks]1. Differentiate between transport mode SA and tunnel mode SA functionality for AH, ESP and ESP with authentication. (3) 2. Explain classes of intruders. (4)
[7 marks]Explain the types of firewall in detail using suitable diagram.
[7 marks]Explain the three parts and four phases of computer virus.
[7 marks]Explain password selection strategies in detail.
[7 marks]