Anda di halaman 1dari 1

UNIT- 3 PUBLIC KEY CRYPTOSYSTEMS

1. Distinguish between conventional and public key encryption methods.


2. Explain the different techniques proposed for distribution of public keys.
3. Discuss Deffie Hellman key exchange algorithm. Explain how the algorithm is used to
exchange secret key.
Users A and B use the Diffie- Hellman key exchange technique with a common prime q=11
and a primitive root α=5.
i) If user A has private key =3, what is A’s public key ?
ii) If user B has private key =2, what is B’s public key ?
iii) What is the shared secret key and ?
4. Explain RSA algorithm in detail and discuss its security.
In RSA system it is given p=7, q=11, e=17, M=8. Find the cipher text C. Also find M from
decryption.
5. What is a hash function? What are the basic uses of a hash function? Explain any three
communication methods, using Hash function with neat diagram.

UNIT-6 INTRUDERS

1. Explain the password selection strategies in detail? Compare their relative merits.
2. Explain the architecture of a distributed intrusion detection system. Give the major issues
in the design.
3. Briefly describe the three classes of intruder.
4. Briefly explain the UNIX password scheme. What are the threats to this scheme? How are
they overcome?
5. Write a note the following
a. Statistical anomaly based detection b. Rule based detection
c. Honeypots, d. Performance metrics.

UNIT 7- MALICIOUS SOFTWARE

1. Give the taxonomy of malicious programs and explain them in brief.


2. List and explain the various virus countermeasures
3. Explain different types of viruses.
4. Explain the typical phases of operation of a virus or worm.
5. Write a short note on E-mail virus and Macro-virus.

Anda mungkin juga menyukai