![]() Why is asymmetric cryptography bad for huge data? Specify the reason.ģ2 between attack and threat.Determine the gcd(24140,16762) using Euclid’s algorithm.Find GCD(1970,1066) using Euclid’s algorithm.Write down the difference between public key and private key cryptosystems.Give the components of public key encryption scheme.Find the GCD of 19 using Euclidian algorithm.How does simple columnar transposition work?.What are the key principles of security?. ![]() What is the use of Fermat’s theorem? (April/May 2011).Differentiate passive attack from active attack with example.List the symmetric key encryption based on algorithm types.Define private key or symmetric key cryptography.Convert the given text “Anna University” into cipher text using rail fence technique.Give the classification of cryptographic system.List out the problems of one time pad.List the four general categories of security attacks.Define cryptanalysis, cryptography and cryptology. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |