What is hash function? Describe how 128-bit of hash value is generated by taking an input message of variable size using MD5 algorithm?
Explain different ethical issues in computing? Explain RSA algorithm with suitable numerical example.
What is symmetric cryptography? Explain round operation of DES algorithm. Describe Sub-Key generation process for DES rounds.
Attempt any Eight questions
[8x5=40]Define authentication. How Biometric information can be used for authentication? Explain.
What is access control? Explain attribute based access control with example.
Decrypt the cipher text "CRHG" using the Hill cipher with the key matrix
| 3 | 4 |
| 5 | 5 |
What is security risk assessment? What are different aspects of a successful security risk assessment?
Differentiate between virus, worm and Trojan horse.
What is Security threat and attack? Describe different types of attacks in brief.
Explain Diffie Hellman Key Exchange Protocol with suitable example.
Define Euler Toient function. Determine whether 37 is Composite or not using Miller Rabin Primality testing.
Write Short Notes on:
a. Phishing Attack
b. Two Factor Authentication