Answer the following problems.
problem 1) prepare a deatail note on VPN architecture.
problem 2) Describe approches for achieving SSO.
problem 3) Alis and Bob want to establish a secret key using Deffie Hellman key exchange protocol. Assuming the values are n = 10, g = 3, x = 5, y = 11. Determine values of A, B, K1 & K2.
problem 4) How challenge/response tokens are used for authentication?
problem 5) Describe the processes of generating digital signature using RSA.
problem 6) Describe 3-D secure protocol.
problem 7) What is intruder? Describe different types of intruders.
problem 8) Consider plain text alphabet D. Using RSA algorithm and value of public key P = 5, E = 3, Q = 11. Determine the private key & cipher text.
problem 9) describe digital Immune system for virus protection.
problem 10) describe how master secret is created from pre-master secret in SSL.