Professional Documents
Culture Documents
22620
3 Hours / 70 Marks Seat No.
Marks
(i) Cryptography
(ii) Cryptology
[1 of 4] P.T.O.
22620 [2 of 4]
(b) Define following with suitable example :
(i) DAC
(ii) MAC
(c) Differentiate between symmetric and asymmetric key cryptography. (any four
points)
(b) Convert plain text into cipher text by using Simple columner technique of the
following sentence :
(c) State any four difference between Firewall and Intrusion Detection System.
(a) Convert the given plain text, encrypt it with the help of Caesor’s cipher
technique.
(e) Find the output of the initial permutation box when the input is given in
hexadecimal as
(i) Assels
(ii) Vulnerability
(iii) Risks
_______________
P.T.O.
22620 [4 of 4]