1. Differentiate b/w Active & Passive attack (5)
2. Explain Substitution Cipher with example (5)
3. Explain Attacks on Crypto Systems( 2 steps) (5)
4. Discuss Limitations of SMTP/RFC 822 & how MIME overcomes these limitations (10)
5. Describe the steps involves in providing Authentication & confidentiality by PGP (10)
6. Explain Kerberos version 4 message exchange (10)
Please handover the blue books on Thursday to me itself, don't hand iR over to Akram sir.
If anyone has any concern regarding the INS internal marks please inform Me or Karthik, don't ask Akram sir.
Regards
Vasanth Kumar.R