Professional Documents
Culture Documents
1.
Can you make a difference between active Attacks and Passive Attacks?
CO-1
CO-1
CO-1
CO-1
How prime number can be used for Factorizing. Justify your Answer
CO-1
CO-1
CO-2
CO-2
CO-2
PART B - (3 X 16 = 48 marks)
1.
(a)
(b)
2.
(a)
(i)
With a neat Block diagram, explain the OSI Security Architecture and the
important parameter associated with it.
OR
Write short notes on the following
i. Fermats and Eulers Theorem.
ii. Chinese Remainder Theorem
Explain any two classical Ciphers and also describe their security in limitations.
OR
16
CO-1
CO-1
16
16
CO-1
(b)
Encrypt the message PAYMOREMONEY using Hill Cipher with the following
Key Matrix and show the decryption to get the original Message
CO-1
16
3.
(a)
(b)
(i)
16
CO-2
16
CO-2