1) Describe S Box and generation sub key from 32-bit key by Blowfish in detail.
2) Explain the way by which the encryption key can be expanded to produce keys for the 10 rounds in AES.
3) Explain in detail about RC4 algorithm.
4) Describe the Miller-Rabin Algorithm with suitable example.
5) Why SHA is more secure than MD5? Explain in detail.
6) Explain the primary idea of HMAC.
7) Explain the one way property to be possessed by any hash function.
8) User A and B switch their key by using Diffie-Hellman algorithm. Suppose α=5 q=11 XA=2 XB=3. Determine the value of YA, YB and k.
9) Write down the properties digital signature must have?
10) What do you mean by masquerading?