Answer the following questions.
Question 1) Write a deatail note on VPN architecture.
Question 2) Describe approches for achieving SSO.
Question 3) Alis and Bob want to establish a secret key using Deffie Hellman key exchange protocol. Assuming the values are n = 10, g = 3, x = 5, y = 11. Determine values of A, B, K1 & K2.
Question 4) How challenge/response tokens are used for authentication?
Question 5) Describe the processes of generating digital signature using RSA.
Question 6) Describe 3-D secure protocol.
Question 7) What is intruder? Describe different types of intruders.
Question 8) Consider plain text alphabet D. Using RSA algorithm and value of public key P = 5, E = 3, Q = 11. Determine the private key & cipher text.
Question 9) Explain digital Immune system for virus protection.
Question 10) Explain how master secret is created from pre-master secret in SSL.