1) Describe the Blowfish encryption and decryption algorithm with the suitable details of sub key generation and substitution boxes.
2) Describe the DES algorithm with the suitable details of single round and also describe about its cryptographic strength.
3) describe the use of elliptic curve cryptography for key exchange and encryption in detail.
4) prepare down the principles of RSA algorithm with suitable exs and also prepare down the possible attacks.
5) Describe about HMAC algorithm and security of HMAC in detail.
6) Describe MD5 algorithm and prepare down the strengths of it.
7) describe S/MIME functions and content types.
8) Describe the various types of firewalls and how to configure firewalls.
9) Describe the different malicious software attacks and also prepare down the remedies.