First question is compulsary
1. a) Explanin the differences between passive attacks and active attacks.
b) Describe Worms.
c) Give the requirements of public key encryption.
d) Explain Compression funcion.
e) Expalin Delegation.
2. a) Explain various types of viruses.
b) Explain simple DES algorithm.
3. Consider a Diffie-Hellman scheme with a common prime q-11 and a primitive root alpha=2.
a) Show that 2 is a primitive root of 11.
b) If user A has public key Ya=9, what is A's priate key Xa?
c) If user B has public key Yb=3, what is the shared secret key K?
4. a) Explain SHA-1 algorithm
b) Explain MD5 algorithm
5. a) Expalin address base authentication protocols.
b) Expalin the Procedures to establish a session key.
6. Desribe Kerberos version 5 Protocol.
7. a) Describe SSL architecture.
b) Explain Athentication Header.
8. a) Explain E-mail security.
b) Explain the content types of MIME.
Tuesday, September 16, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment