![]() PART -B Department of Computer Science and Engineering Semester: VII Year: IV Specify the components of encryption Algorithm.Differentiate active and passive attacks.(Nov/Dec 2018)ģ3 cipher text for the following using one time pad cipher. Why is asymmetric cryptography bad for huge data? Specify the reason.ģ2 between attack and threat.Determine the gcd(24140,16762) using Euclid’s algorithm.Find GCD(1970,1066) using Euclid’s algorithm.Write down the difference between public key and private key cryptosystems.Give the components of public key encryption scheme.Find the GCD of 19 using Euclidian algorithm.How does simple columnar transposition work?.What are the key principles of security?.What is the use of Fermat’s theorem? (April/May 2011). ![]() Differentiate passive attack from active attack with example.List the symmetric key encryption based on algorithm types. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |