problem 1:
How do you examine the computational complexity of the security algorithm?
problem 2:
List the concept of the Ceaser cipher.
problem 3:
Make a distinction between symmetric and asymmetric encryption algorithms.
problem 4:
Describe the principle of the Blowfish algorithm.
problem 5:
How do you compute the encryption and decryption keys in the RSA algorithm?
problem 6:
Mention any two characteristics of the elliptic curves.
problem 7:
Provide a diagrammatic representation of the PGP.
problem 8:
How Security Socket layer is located in network modeling?
problem 9:
Illustrate out the shortcomings of IP packet filtering.
problem 10:
Examine any two shortcomings of placing firewalls on routers.