Question 1:
With an assumed instance, illustrate out how Hash function can be employed in cryptography.
Question 2:
Discuss how security features are provided in e-mail applications by using SMTP and MIME protocols.
Question 3:
Critically discuss the concept and operating principle of Kerberos 402.
Question 4:
Describe any two important features of the IP security in detail.
Question 5:
Examine the features, advantages and disadvantages of the Application level and circuit level gateways in detail.
Question 6:
Illustrate out the different ISO standards which are used in network security and cryptography.