How do you examine the computational complexity of the security algorithm?
List the concept of the Ceaser cipher.
Make a distinction between symmetric and asymmetric encryption algorithms.
Describe the principle of the Blowfish algorithm.
How do you compute the encryption and decryption keys in the RSA algorithm?
Mention any two characteristics of the elliptic curves.
Provide a diagrammatic representation of the PGP.
How Security Socket layer is located in network modeling?
Illustrate out the shortcomings of IP packet filtering.
Examine any two shortcomings of placing firewalls on routers.