Question 1:
Illustrate out the term Transposition Techniques in detail.
Question 2:
Critically illustrate a model for Network Security.
Question 3:
Write down in detail about the Feisel Cipher Structure.
Question 4:
Illustrate out the term Elliptic Curve Cryptography. How is it helpful in Network Security?
Question 5:
Discuss about the various Authentication functions and their effectiveness in the Network security.
Question 6:
Write down comprehensive notes on the Linear and Differential Crypt Analyses.
Question 7:
Illustrate out the term Diffe-Hellman key exchange.