Professional Documents
Culture Documents
CS 010 803 Security in Computing
CS 010 803 Security in Computing
Module 2
13. Explain about DES algorithm and its avalanche effect.
Or
14. Explain RSA algorithm. Discuss the three possible approaches to attack RSA algorithm.
Module 3
15. Explain how to generate and verify digital signatures.
Or
16. Explain about Kerberos version 4. Differentiate Kerberos version 4 and version 5.
Module 4
17. Explain about S/MIME.
Or
18. Explain about Pretty Good Privacy.
Module 5
19. Explain different approaches on intrusion detection?
Or
20. Explain about viruses and its related threats?
(5 x 12 = 60 marks)