Professional Documents
Culture Documents
Ns Cat QP
Ns Cat QP
4.What is meant by Brute force attack? 5.Draw the diagram for Asymmetric key cryptography?
5.Draw the diagram for Asymmetric key cryptography? 6.What is meant by FCS?
9.Explain Rail Fence technique. 10.List the types of substitution techniques available.
PART – B PART – B
Answer all the questions :- (2x15=30) Answer all the questions :- (2x15=30)
11(a)Explain about substitution techniques in detail.(15) 11(a)Explain about substitution techniques in detail.(15)
(OR) (OR)
(b)Describe about the types of transposition techniques.(15) (b)Describe about the types of transposition techniques.(15)
12(a)Explain about message encryption authentication function.(15) 12(a)Explain about message encryption authentication function.(15)
(OR) (OR)
(b)(i)Describe about message authentication code technique.(8) (b)(i)Describe about message authentication code technique.(8)
(ii)Explain about hash function authentication technique.(7) (ii)Explain about hash function authentication technique.(7)