Answer the following 1) Define Active attacks. 2) The secret key for the sender and the receiver is same in which kind of encryption? 3) What is the size of the message digest for SHA-512? 4) What is Kerberos? 5) Give the difference between transport mode and tunnel mode. 6) What are the three classes of intruders? 7) Explain what do you understand by data integrity?
[7 marks]Explain in detail security attacks.
[7 marks]Explain the Feistel Cipher structure.
[7 marks]Differentiate between AES and DES. Also explain Triple DES in detail.
[7 marks]Explain the various cipher block modes of operations.
[7 marks]1) Explain the basic five ingredients of Symmetric Encryption principles. 2) What do you understand by digital signatures?
[3 marks]What is secure hash function? Explain the properties of a good hash function.
[7 marks]Explain RC4 algorithm.
[7 marks]What is public key cryptography? Explain any one public key cryptography algorithm in detail.
[7 marks]Explain the IEEE 802 Protocol architecture.
[7 marks]Write a note on SSL record protocol.
[7 marks]What do you mean by port forwarding? Explain local forwarding and remote forwarding.
[7 marks]What is ESP(Encapsulating Security Payload) used for? Explain the ESP format.
[7 marks]Write a note on PGP (Pretty Good Privacy).
[7 marks]What do you understand by intrusion? Explain how statistical anomaly Detection does instruction detection?
[7 marks]List out the various categories of malicious software. Explain any two in detail.
[7 marks]Define a Firewall. Explain packet filtering firewall in detail.
[7 marks]