1) Describe RSA algorithm in detail with suiatble.
2) Describe the different key management techniques.
3) prepare detailed notes on different hash functions.
4) Describe the different password management techniques
5) In SSL and TSL, describe why there is separate change cipher spec protocol, rather than change-cipher-spec message in handshake protocol.
6) Describe Kerberos in detail.
7) prepare down the principles of firewall design.
8) prepare about advanced antivirus techniques and its approaches in detail.