QB - Ut1
QB - Ut1
Interruption
Interception
Modification
Fabrication
Symmetric Asymmetric
5. Define cryptanalysis?
It is a process of attempting to discover the key or plaintext or both.
7. Define steganography
Hiding the message into some cover media. It conceals the existence of a message.
8. Why network need security?
When systems are connected through the network, attacks are possible
during transmission time.
SUBSTITUTION TRANSPOSITION
PART-B
1. Explain the followings:
(a) Playfair cipher. (8)
(b) Vernam cipher in detail. (8)
2. Explain simplified DES with example. (16)
3. Write short notes on i) Steganography(16)
4. Explain classical Encryption techniques in detail. (16)
5. Write short notes on
(a) Security services(8)
(b) Feistel cipher structure(8)
6. Explain the OSI security architecture. (16)