Attempt any Eight questions.
[8*5=40]
4.
Define discrete logarithm. Explain the procedure of sharing the secret key in Diffie Hellman. [5]
5.
Distinguish between stream cipher and block cipher. Encrypt the message WE ARE IN SAME RACE UNTILL OVER LIVE END using Rail fence cipher using 4 as a number of rails. [5]
6.
Define digital signature. Describe the approaches of DSS. [5]
7.
What is the task of a firewall? List the elements of X.509. [5]
8.
How does the nature of worms differ from viruses? Define PKI with its architecture model. [5]
9.
Explain the procedure of mix column transformation in AES with an example. [5]
10.
What is the role of the prime number in the Euler totient Function? Find the GCD of 12 and 16 using the Euclidean algorithm. [5]
11.
Write down any two limitations of MAC. What do policy and mechanism mean in cryptography? Describe with a scenario. [5]
12.
Write short notes on: a. Classes of Intruder b. SSL c. DoS Attack [5]