2 List 4 requirements that were defined by Kerberos. Assume a client C wants to 10M communicate with a server S using Kerberos Version 4. How can it be achieved? 3 What is the role of Ticket Granting Server in Kerberos Version 4? 10M 4 Give a summary of Kerberos Version 4 Message Exchanges with a neat diagram 10M and message exchanges. (or) Discuss elaborately how Kerberos Version 4 provides the different authentication services 5 What are the technical deficiencies in the Kerberos version 4 protocols? 10M 6 Explain with a diagram, how a client in one realm request for service in another 10M realm. (or) Describe the authentication dialog used by Kerberos for obtaining services from another realm. 7 Explain Kerberos Version 5 authentication dialogue. 10M 8 Describe the PGP Cryptographic Functions with a neat diagram. Or 10M What is PGP? Examine how authentication and confidentiality is maintained 9 Give the reason for using PGP? 10M Why does PGP generate a signature before Apply compression? With a neat diagram, explain Transmission and Reception of PGP Messages 10 Define S/MIME. Explain the various headers defined in MIME. 10M 11 Explain the various S/MIME functions and Cryptographic Algorithms Used in 10M S/MIME 12 Explain DKIM functional flow with a neat diagram. 10M 13 Draw a diagram to explain the IP security scenario and explain the benefits of 10M IPsec (or) Draw a diagram to explain the IP security scenario and explain the applications of IPsec. 14 Give the categorization of IPsec documents. Also list out the IPsec services. 10M What do you mean by Security Association? Illustrate the parameters that 10M identify the Security Association. 15 With a diagram explain the IPsec Architecture. Also explain the components 10M SAD and SPD. 16 Draw and explain the IP Traffic Processing model for inbound and outbound 10M packets. 17 With a neat diagram explain the top-level format of an ESP Packet. 10M What is transport mode and tunnel mode authentication in IP? Describe how 10M ESP is applied to both these modes? 18 With a neat diagram, explain the Basic combinations of Security Associations 10M 19 Explain the two types of key management supported by IPsec architecture. Also 10M list the important features of IKE Key determination algorithm. 20 Explain IKE header and the payload formats with a help of a neat diagram. 10M