Attempt any Eight questions.
[8*5=40]
4.
Differentiate between Trojan horse and virus. Describe any two types of intruders. [5]
5.
The message “IMOGUN” was encrypted with a Playfair cipher using keyword “GALOIS”. Decrypt the message. [5]
6.
How encryption is done using IDEA algorithm. [5]
7.
Describe the services provided by Pretty Good Privacy protocol to secure email. [5]
8.
Define challenge response system. Why do we need Kerberos? [5]
9.
How direct digital signature different from arbitrated digital signature? How digital signature generation and verification is done using RSA. [5]
10.
Why do we need discrete logarithm over normal logarithm? Find out whether 3 is primitive root of 7 or not. [5]
11.
Which one is more secure, monoalphabetic cipher or poly alphabetic cipher? Justify. Using rail fence cipher encrypt the text 'LEARNING AND TEACHING ARE DIFFERENT' using 3 as rails. [5]
12.
What is the condition of for two integers, x and y, to be relatively prime? Find whether 61 is prime or not using Miller-Rabin algorithm. [5]