Professional Documents
Culture Documents
Security
Security
Security
Chap-1
5. Explain MOM.
Chap-2
1. Define following
Cryptography
Cryptosystem
Symmetric cryptosystem
Asymmetric cryptosystem
Cipher-text only attack
6. Explain Caesar Cipher & permutation with example & with adv & disadv.
13.Draw a flow chart to show iterative substitution and transposition used in DES
algo to convert plain text into cipher text.
Chap-3
3. Types of virus or