Professional Documents
Culture Documents
PART-A 2*10=20
1.What is cryptography?
2.Give any four names of substitution techniques
3.What are the services defined by x.800?
4.What is the purpose of Diffie-Hellman algorithm?
5.Define man in the middle attack
6.List design objectives for HMAC
7.What is MAC?
8.What are the requirements for digital signature?
9.Give the Kerberos simple dialogue
10.What is firewall?
PART-B 5*16=80
(OR)
b(i) Explain briefly about block cipher principles and modes of operation (12)
(ii) Explain about traffic confidentiality (4)
(OR)
(OR)
(OR)
b(i) Explain briefly about web security (16)
15 a(i) Discuss the design principles of firewall (8 )
(ii) What is meant by password management? (8 )
(OR)
b(i) What is meant by virus and explain briefly about threats? (16)