1) Describe S Box and generation sub key from 32-bit key by Blowfish in detail.
2) describe the way by which the encryption key can be expanded to produce keys for the 10 rounds in AES.
3) describe in detail about RC4 algorithm.
4) Describe the Miller-Rabin Algorithm with suitable ex.
5) Why SHA is more secure than MD5? describe in detail.
6) describe the primary idea of HMAC.
7) describe the one way property to be possessed by any hash function.
8) User A and B switch their key by using Diffie-Hellman algorithm. Suppose α=5 q=11 XA=2 XB=3. Determine the value of YA, YB and k.
9) prepare down the properties digital signature must have?
10) What do you mean by masquerading?