1) describe Substitution Technique and prepare down their merits and demerits.
(ii) Describe in detail Transposition Technique?
2) prepare brief notes on:
(i) Security attacks
(ii) Security services.
3) Convert “MEET ME” by using Hill cipher with the key matrix
4)(i) Briefly describe the design principles of block cipher.
(ii) Discuss in detail block cipher modes of operation.
5) prepare short notes on:
(i) Fermat and Eluer’s theorem
(ii) Chinese Remainder theorem
6) Carry out encryption and decryption by using RSA Algorithm for the following: P=7; q=11; e=17; M=8.
7) describe where the miller-rabin algorithm is used
8) What is the purpose of the Sub Bytes?
9) prepare down the difference between Sub Bytes and Sub Word?
10) prepare down one technique of attacking RSA in detail.