1) Describe the DES algorithm with the details of single round and also describe about its cryptographic strength in detail.
2) describe the use of elliptic curve cryptography for key exchange and encryption in detail.
3) prepare down the principles of RSA algorithm with suitable exs and also prepare down the possible attacks.
4) Describe about HMAC algorithm and security of HMAC in detail.
5) Describe MD5 algorithm and prepare down the strengths of it in detail with suitable ex.
6) Describe the Kerberos version four authentication dialogues in detail.
7) Describe S/MIME functions and content types in detail.
8) prepare down the various types of firewalls and describe how to configure firewalls.