Professional Documents
Culture Documents
Unit 1
Unit 2
Q 9. What are the security considerations for hash functions, and how
can they be vulnerable to attacks?
Q 10. Explain the Electronic Codebook (ECB) mode in DES. What are its
strengths and weaknesses in terms of data encryption?
Unit 3
Q 14. What is the RSA Signature Scheme and what are its security
requirements:
Unit 4
Q 17. Can you explain the Needham-Schroeder Scheme for session key
Distribution?
Q 22. Can you explain the Cocks Identity-based Cryptosystem and its
Significance?