Answer the following questions.
Question 1) Describe meet-in-middle attack.
Question 2) What is algorithm modes? List four algorithm modes.
Question 3) What is cross certification?
Question 4) Distinguish between authentication and authorization.
Question 5) What is stenography? Give a suitable example.
Question 6) State e-mail related crimes.
Question 7) What do you mean by delta - CRL?
Question 8) What do you mean by message digest?
Question 9) What are the services provided by IP Sec?
Question 10) Describe broad level steps in PEM.
Question 11) Describe key transformation process by DES.
Question 12) What is electronic money? Discuss the types of electronic money.
Question 13) Describe working of RC-5 with suitable example.
Question 14) Write a note on Blowfish.
Question 15) Describe key generation and management using RSA.
Question 16) Describe working of HMAC.
Question 18) Describe how PGP provides authentication as well as confidentiality?