CNS 2
CNS 2
4. Decode the message:MXOQCY IFUDT YDWIE CKSXJ YCUED JXYI (Shift code c = p -10).
7. What are the mathematical methods used in cryptography? Give their significance.
9. What is Network Security? What are the four goals of network security?
10. What tricks do attackers use to hack online banking accounts? How to prevent them?
12. What are the two basic ways of transforming a plaintext into a ciphertext?
14. What is timing attack? What are the possible defenses against it?
15. What are the elements of information security? Explain each in brief.
16. List and briefly define categories of security services and attacks.
17. Describe the model for network security with a neat sketch.
22. What is steganography? Explain its techniques and how it differs from cryptography.
1. What is a symmetric encryption scheme? What are the five elements of it?
2. What are the mathematical concepts used in symmetric cryptographic algorithms? How is
algebra used in cryptography?
UNIT III
12. Given N = 187 and E = 17, find the private key D in RSA.
14. Encrypt and decrypt letter 'G' using RSA with E = 3, D = 11, N = 15.
UNIT IV
9. What are the three criteria a cryptographic hash function must satisfy?
UNIT V
1. What is PGP? Draw and explain the general PGP packet structure.