MODULE 1
MODULE 2
MODULE 3
MODULE 4
MODULE 5
100

Single Key 

Symmetric encryption

100

Deffie Helman public key cryptosystem was based on

Asymmetric keys

100

Key which is uesd for duration of logical connection

Session keys

100

To enable secure, convenient and efficient acqusition of public keys which infrastucture was developed 

Public key Infrastructure

100

AH means

Authentication protocol

200

Two keys

Asymmetric encryption

200

Readable message which is input to algorithm

Plaintext

200

TAG approach and Control vector approach are types of

Controlling key usage

200

PKIX management protocols

RFC-2510,RFC 2797

200

ESP full form

Encapsulating Security Payload

300

Vernam cipher and Vigenere cipher are types of

Polyalphabetic cipher

300

Encrypted message produced as output

Ciphertext

300

Adversary who can subsitute another message

Man in the middle attack

300

The process of verifying an identity claimed by or for a system entity

Remote user Authentication

300

IPsec interaction with two databases

Security association database, Security policy database

400

Trying all possible ways of attack

Brute force attack

400

Full form of RSA algorithm

Rivest Shamir Adleman

400

Distribution of public key has how many schemes

Four schemes

400

Protocol which enables communicating parties to satisfy themselves mutually about each others identity and to exchange session key

Mutual Authentication protocol

400

TFC stands for

Traffic flow confidentiality

500

Best known multiple letter encryption technquie

Playfair cipher

500

Attack depending on running time of decryption algorithm

Timing attack

500

Technique which support key generation, storage and maintenance of the key

Key management

500

Issues of Authentication protocol

Confidentiality and timeliness

500

EAP stands for

Extensible Authentication protocol

M
e
n
u