Question 1:
Devise the pseudo code to list the steps which are involved in Playfair Cipher. Also, trace the working principle of this Cipher with an appropriate example.
Question 2:
Critically discuss the concept of the Vernam cipher. Examine its advantages and limitations.
Question 3:
Illustrate out the generic model of network security. Also, categorize and brief various types of attacks.
Question 4:
Demonstrate various steps which are involved DES encryption algorithm with appropriate diagrammatic narration.
Question 5:
Illustrate out the Eculid’s algorithm with its areas of applications.
Question 6:
With the use of appropriate example, how keys are exchanged in Diffie-Hellman key exchange algorithm.
Question 7:
Describe and show the Chinese Remainder theorem.