D. Write A Note On VPN
D. Write A Note On VPN
(2) Make suitable assumptions wherever necessary and state the assumptions made.
(3) Answers to the same question must be written together.
(4) Numbers to the right indicate marks.
(5) Draw neat labeled diagrams wherever necessary.
(6) Use of Non-programmable calculators is allowed.
10
10
10
Explain in details how symmetric and asymmetric key cryptography can be combined.
State and explain with example steps involved with RSA algorithm.
How Hash-based Message authentication works?
Explain problems with public key exchange.
10
10
a.
b.
c.
d.
10
15