Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part C Each question carries 8 marks - 3 x 8 = 2 4 Marks Theory answers must be atleast 1 6 lines 1 7

Part C
Each question carries 8 marks -3x8=24 Marks Theory answers must be atleast 16 lines
17 A. Explain in details, why we need security policy and explain components of security policy
OR
B. Explain any 6 categories of security mechanism
18 A. Perform Playfair cryptography for the following:
Message: I am in Muscat Oman
Keyword: TOYOTA
OR
B. Statement: "Hash functions are a crucial component of cryptography". Support the statement with your answer, your answ must have the answer for why and how.
19 A. Perform S-Box for the bits: 0110000100010111101110101000100110010100100111
\table[[\table[[Row],[number]],Column Number],[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15],[0,14,4,is,1,2,15,II,8,3,10,6,12,5,9,0,7],[1,0,15,7,4,14,2,13,1,10,6,12,11,9,5,3,8],[2,4,1,14,8,13,6,2,11,15,12,9,7,3,10,5,0],[3,15,12,8,2,4,9,1,7,5,11,3,14,10,0,6,13]]
OR
B. Demonstrate the steps involved in AES algorithm
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Write short notes on Interviews.

Answered: 1 week ago