1. Discuss any four Substitution Technique and list their merits and demerits. 2. Explain in detail Transposition Technique? 3. Write short notes on a. Security attacks b. Security services. 4. Write short notes on a. Fermat and Eluers theorem b. Chinese Remainder theorem 5. Identify the possible threats for RSA algorithm and list their counter measures..