Answer the following problems.
problem 1) Describe meet-in-middle attack.
problem 2) What is algorithm modes? List four algorithm modes.
problem 3) What is cross certification?
problem 4) Distinguish between authentication and authorization.
problem 5) What is stenography? Give a suitable ex.
problem 6) State e-mail related crimes.
problem 7) What do you mean by delta - CRL?
problem 8) What do you mean by message digest?
problem 9) What are the services provided by IP Sec?
problem 10) Describe broad level steps in PEM.
problem 11) Describe key transformation process by DES.
problem 12) What is electronic money? Discuss the types of electronic money.
problem 13) Describe working of RC-5 with suitable ex.
problem 14) prepare a note on Blowfish.
problem 15) Describe key generation and management using RSA.
problem 16) Describe working of HMAC.
problem 18) Describe how PGP provides authentication as well as confidentiality?