Attempt any Eight questions.
[8*5=40]
4.
What does intrusion mean? How the system detect intrusion? List any four types of firewall. [5]
5.
Decrypt the message 'GVPJ' using Hill cipher taking the key as {Row1 = 3 7, Row2= 5 12}. [5]
6.
Describe the PKI trust model. [5]
7.
Define authentication system. Illustrate the need of mutual authentication over one way authentication with an example. [5]
8.
Find the value of 72019mod13 using Fermat’s Little theorem. Define Euler totient function with an example. [5] 9.
List the properties of hash function. Discuss the first pass of MD4. [5]
10.
Differentiate between Symmetric and Asymmetric cipher. Encrypt the message 'HELL' using the key 'FAIL' using Vernam cipher. [5]
11.
Divide 3x2+4x+3 by 5x+6 over GF(7). [5] 12.
Define SSL protocol. Mention the services provided by PGP. [5]