Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm.
Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain.
Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol.
Attempt any Eight questions
[8x5=40]Discuss about two factor authentication with an example.
Explain the different types of access control principles.
Describe any two types of malicious software.
What is risk assessment? Describe the security auditing architecture.
Do cybercrime and computer crimes refers to same? Justify with relevant scenarios.
What do you mean by countermeasures for malwares? Discuss about audit trail analysis.
List some issues for user authentication. What is trust framework?
What is the role of digital signature in message authentication? List any two natures of zombies.
Write the algorithm for RSA key generation with encryption and decryption.