Attempt any Eight questions.
[8*5=40]
4.
Show the encryption of plain text "ALGORITHM" using the key "PSEUDOCODE" using playfair cipher. [5]
5.
Discuss the working mechanism of kerberos protocol. [5]
6.
What is the use of firewall? How circuit level gateway differs from stateful inspection firewall? [5]
7.
What is intrusion? Explain any two types of intrusion detection system. [5]
8.
Find the multiplicative inverse of polynomial (95) using extended euclidean Algorithm. [5]
9.
What is DoS attack? Discuss about PKI trust model. [5]
10.
Using Vigenere cipher with key = “worlds”, encrypt the plain text “hello everyone”. [5]
11.
Describe the different modes of block cipher. [5]
12.
Write short notes on (any two) a. Totient value of any positive integer. b. Properties of hash function. c. Virus or Worms. [5]