problem 1:
Devise the pseudo code to list the steps which are involved in Playfair Cipher. Also, trace the working principle of this Cipher with an appropriate ex.
problem 2:
Critically discuss the concept of the Vernam cipher. Examine its advantages and limitations.
problem 3:
Illustrate out the generic model of network security. Also, categorize and brief various types of attacks.
problem 4:
Demonstrate various steps which are involved DES encryption algorithm with appropriate diagrammatic narration.
problem 5:
Illustrate out the Eculid’s algorithm with its areas of applications.
problem 6:
With the use of appropriate ex, how keys are exchanged in Diffie-Hellman key exchange algorithm.
problem 7:
Describe and show the Chinese Remainder theorem.