Forgot Password?
Mobile number is now mandatory for the security of your account.
We've sent you a verification code on your mobile number. Please enter it here to set a new password.
We've sent you a verification code on your mobile number or email address. Please enter it here to set a new password.
(a) Encrypt the message "The house is being sold tonight" using the following ciphers. Ignore the space between the words. Also decrypt the message to get back the original plaintext:
(i) Vignere cipher with key: dollars
(ii) Autokey cipher with key = 7
Attempt:
(f) List and explain the security services provided by digital signature.
Attempt :
(c) IDS
(b) Types of Firewalls
(a) PGP Protocol
(b) Explain DES Function in detail.
(a) Using "GGSIP University" as a key for Playfair Cipher, encrypt the message "Cryptography and Network Security."
(b) How intrusions can be detected? Explain intrusion prevention system in brief.
(a) What is Kerberos? Discuss Kerberos version 4 in detail. What is S/MIME and its main function?
(h) List four kinds of cryptanalysis attacks.
(g) What is cyber forensics? How hacking is different from cracking ?
(a) Compare MD-5 algorithm and SHA-1 algorithm used for hashing.
(e) What is SSL and explain the role of SSL in information security.
(d) Explain the difference between stream cipher and block cipher with the help of examples.
(c) Compare active and passive attacks. List the various types of active and assive attacks.
(b) Distinguish between linear and differential cryptanalysis. Which oneis a chosen- plaintext attack and which one is known-plaintext attack?
(a) What is the difference between virus, worms, Trojen horses and botnets?
(b) Explain the following types of attacks-Phishing, DNS Spoofing, DDOS and SQL Injection.
(b) Perform encryption and decryption using algorithm for P-3,e = 7 and M-5. -17,
Congratulations! Your trial of
is now active.
Let's catch up on a Zoom call and I'll help you craft a killer career plan! Bring your own coffee.
Sourabh Bajaj