Attempt any Eight questions.
[8*5=40]
4.
Show encryption and decryption of "csit" using hill cipher having key, [5]
5.
Give the formal definition of authentication system. Describe about one way and mutual authentication system. [3527] [5] 6.
List the stage of certificate life cycle. What are the types of firewalls? [5]
7.
What is malicious logic? How zombies are different from trojan horses? [5]
8.
How Miller Rabin test is used for primality testing? Show whether the number 561 passes the test. [5]
9.
Show that the set of integers is Ring under addition and multiplication. [5]
10.
How substitution ciphers are different from transposition ciphers? Given a message M="CSIT PROGRAM IS A HOT CAKE", encrypt M using Rail Fence cipher with rail size 3. [5]
11.
Describe about IPSec. List the five services of PGP. [5]
12.
How does meet in middle attack work in Diffie Helman key exchange protocol? Explain. [5]