With an assumed instance, illustrate out how Hash function can be employed in cryptography.
Discuss how security features are provided in e-mail applications by using SMTP and MIME protocols.
Critically discuss the concept and operating principle of Kerberos 402.
Describe any two important features of the IP security in detail.
Examine the features, advantages and disadvantages of the Application level and circuit level gateways in detail.
Illustrate out the different ISO standards which are used in network security and cryptography.