Professional Documents
Culture Documents
L77Str.: 2,02T, Seiviester Compltttrr, (NSC) 2017)
L77Str.: 2,02T, Seiviester Compltttrr, (NSC) 2017)
L77Str. 1
Note : (i) Answer Question No. 1 and any ONtr Question from each
Unit"
UNIT I
(b) Li.st the categories of how Computer algorithms and Protocols are
grouped. (5)
_
Oq
rl
o. (a) Describe the Challenges of Computer Security. (5)
Turn Over
UNIT II
(b) Encrypt the message "Meet me in the mid-night" using play fair cipher.
(5)
Or
(b) List any two types of Blor:k cipher mod.es of operation and explain. (5)
Or
(b) State the d.ifferences between Sub bytes and shift rows in AES. (5)
UNiT iV
Or
UNIT V
10. (a) Describe the requirements f,or a Cryptographic Hash F unction. (5)
Or
2 L77 s 11