Devise the pseudo code to list the steps which are involved in Playfair Cipher. Also, trace the working principle of this Cipher with an appropriate ex.
Critically discuss the concept of the Vernam cipher. Examine its advantages and limitations.
Illustrate out the generic model of network security. Also, categorize and brief various types of attacks.
Demonstrate various steps which are involved DES encryption algorithm with appropriate diagrammatic narration.
Illustrate out the Eculid’s algorithm with its areas of applications.
With the use of appropriate ex, how keys are exchanged in Diffie-Hellman key exchange algorithm.
Describe and show the Chinese Remainder theorem.