Professional Documents
Culture Documents
Describe Oakley Key Determination Protocol. Explain SSL Handshake Protocol With Example
Describe Oakley Key Determination Protocol. Explain SSL Handshake Protocol With Example
Describe Oakley Key Determination Protocol. Explain SSL Handshake Protocol With Example
ANSWER ANY TWO QUESTIONS. ALL THE QUESTIONS CARRY EQUAL MARKS.
Course Outcomes
CO411.5.3: Differentiate various cryptography methods, Cryptographic tools and attacks.
CO411.5.5: Describe overall process of IP security, Secure Socket Layer, Transport Layer Security, Secure
Electronic Transaction.
SL. Knowledge
Question Marks CO Code
NO Level
Explain two methods of encrypting plain text into cipher text with 6.5M CO411.5.3 K2
1 a
diagram.
Define the following terms (i)cryptography
6M CO411.5.3 K2
b (ii)Steganography
(iii)Work factor
CO411.5.5 K2
2 a Describe Oakley key determination protocol. 12.5M
CO411.5.5 K2
3 a Explain SSL Handshake protocol with example. 12.5M
ANSWER ANY TWO QUESTIONS. ALL THE QUESTIONS CARRY EQUAL MARKS .
Course Outcomes
CO411.5.3: Differentiate various cryptography methods, Cryptographic tools and attacks.
CO411.5.5: Describe overall process of IP security, Secure Socket Layer, Transport Layer Security, Secure
Electronic Transaction.
SL. Knowledge
Question Marks CO Code
NO Level
Explain two methods of encrypting plain text into cipher text with 6.5M CO411.5.3 K2
1 a
diagram.
Define the following terms (i)cryptography
6M CO411.5.3 K2
b (ii)Steganography
(iii)Work factor
CO411.5.5 K2
2 a Describe Oakley key determination protocol. 12.5M
CO411.5.5 K2
3 a Explain SSL Handshake protocol with example. 12.5M