Flat 50% off on all training & certification courses. Limited time offer Explore courses

Use these filters to find papers

  Question
3

(a) Encrypt the message "The house is being sold tonight" using the following ciphers. Ignore the space between the words. Also decrypt the message to get back the original plaintext:

(i) Vignere cipher with key: dollars

(ii) Autokey cipher with key = 7 

This question has 0 answers so far.
0

Attempt:

(f) List and explain the security services provided by digital signature.

This question has 0 answers so far.
0

Attempt :

(c) IDS

This question has 0 answers so far.
0

Attempt :

(b) Types of Firewalls

This question has 0 answers so far.
0

Attempt :

(a) PGP Protocol

This question has 0 answers so far.
0

(b) Explain DES Function in detail.

This question has 0 answers so far.
0

(a) Using "GGSIP University" as a key for Playfair Cipher, encrypt the message "Cryptography and Network Security." 

This question has 0 answers so far.
0

(b) How intrusions can be detected? Explain intrusion prevention system in brief. 

This question has 0 answers so far.
0

(a) What is Kerberos? Discuss Kerberos version 4 in detail. What is S/MIME and its main function?

This question has 0 answers so far.
0

Attempt:

(h) List four kinds of cryptanalysis attacks. 

This question has 0 answers so far.
0

 Attempt:

(g) What is cyber forensics? How hacking is different from cracking ?

This question has 0 answers so far.
0

(a) Compare MD-5 algorithm and SHA-1 algorithm used for hashing.

This question has 0 answers so far.
0

Attempt:

(e) What is SSL and explain the role of SSL in information security.

This question has 0 answers so far.
0

Attempt:

(d) Explain the difference between stream cipher and block cipher with the help of examples.

This question has 0 answers so far.
0

Attempt:

(c) Compare active and passive attacks. List the various types of active and assive attacks.

This question has 0 answers so far.
0

Attempt :

(b) Distinguish between linear and differential cryptanalysis. Which oneis a chosen-       plaintext attack and which one is known-plaintext attack?

This question has 0 answers so far.
0

Attempt :

(a) What is the difference between virus, worms, Trojen horses and botnets?

This question has 0 answers so far.
0

(b) Explain the following types of attacks-Phishing, DNS Spoofing, DDOS and SQL Injection. 

This question has 0 answers so far.
0

(b) Perform encryption and decryption using algorithm for P-3,e = 7 and M-5. -17, 

This question has 0 answers so far.