Attempt any Eight questions.
[8*5=40]
4.
Describe any three types of malicious logic. [5]
5.
Given the key "HELLOWORLD", encrypt the plaintext "TURINGTEST" using Play fair cipher. [5]
6.
Explain any two modes of block cipher encryption. [5]
7.
Describe the working mechanism of digital signature algorithm. [5]
8.
State Fermat's theorem with example. What is the implication of discrete logarithm? [5]
9.
List and explain the types of firewall. [5]
10.
Define authentication system. Discuss about challenge response system. [5]
11.
Decrypt the ciphertext 'HI' using Hill Cipher where the key is. Ciphertext: HI, Key: [5433] [5] 12.
What is digital certificate? Discuss the certificate life cycle. [5]