Question 1:
How do you examine the computational complexity of the security algorithm?
Question 2:
List the concept of the Ceaser cipher.
Question 3:
Make a distinction between symmetric and asymmetric encryption algorithms.
Question 4:
Describe the principle of the Blowfish algorithm.
Question 5:
How do you compute the encryption and decryption keys in the RSA algorithm?
Question 6:
Mention any two characteristics of the elliptic curves.
Question 7:
Provide a diagrammatic representation of the PGP.
Question 8:
How Security Socket layer is located in network modeling?
Question 9:
Illustrate out the shortcomings of IP packet filtering.
Question 10:
Examine any two shortcomings of placing firewalls on routers.