Answers the following: 1. Define Message Authentication 2. Define Active attacks. 3. What do you mean by Asymmetric encryption? 4. MIME coverts ASCII-data into non-ASCII data. [True/False] 5. Define Denial of Service. 6. What are the three classes of intruders? 7. Explain the term “Salt”.
[7 marks]Explain in detail security attacks.
[7 marks]1. Compare DES, 3DES and AES. (3) 2. List different fields of Authentication Header.(4)
[7 marks]Explain AES with diagram.
[7 marks]Explain Diffie-Hellman key exchange with highlighting the need of it
[7 marks]Explain SHA-256 with diagram.
[7 marks]Explain HMAC algorithm with suitable diagram.
[7 marks]What is public key cryptography? Explain any one public key cryptography algorithm in detail.
[7 marks]Briefly explain the structure/format indicating the different fields of Public Key Ring in PGP.
[7 marks]Discuss Kerberos protocol with diagram.
[7 marks]What is random number generator? Discuss TRNG, PRNG and PRF with suitable diagram.
[7 marks]Explain Intrusion Detection System.
[7 marks]What do you mean by port forwarding? Explain local forwarding and remote forwarding.
[7 marks]Describe RSA algorithm with example.
[7 marks]Describe Firewall with its types.
[7 marks]List out the various categories of malicious software. Explain any two in detail.
[7 marks]Write notes on X.509 certificate.
[7 marks]