Cryptography 2074

Tribhuwan University
Institute of Science and Technology
2074
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1. Answer the following questions in short (Any Five).                                         

        a. What are the typical phases of operation of virus?

2 marks view

        b. Find Multiplicative inverse of each nonzero elements in Z5.

2 marks view

        c. Why Hash Functions are often known as one way functions?

2 marks view

        d. how Vignere Cipher can be used to ensure poly-alphabetic substitution?

2 marks view

        e. Using extended Euclidean Algorithm, find multiplicative inverse of 550 and 1769.

2 marks view

        f. Define PKI Trust Model.

2 marks view

        g. What do you mean by odd round in IDEA?

2 marks view

2.

    a) What do you mean by transposition cipher? Decrypt the ciphertext UIESTNVRIY using the Railfence cipher using the rail size 2.

4 marks view

    b) Consider the message blocks m1, m2, m3. If the Cipher Block Chaining mode DES encryption can be expressed as  Now, write the expressions for the DES decryption to extract each of the message blocks m1, m2, m3.

6 marks view

3.

    a) How padding is done in MD5? What enhancements in MD4 are done to get better hash function MD5?

6 marks view

    b) Construct a playfair matrix with the key CRYPTO. Using this matrix encrypt the message "have a nice day".

4 marks view

4.

    a) In a RSA system, a user named Messi has chosen the primes 5 and 11 to create a key pair. Now show the generation of public key pair (eMessi, n) and private key pair (dMessi, n). Show how Messi can encrypt the message "Soccer" using his own public key.

6 marks view

    b) What is the role of SSL Handshake Protocol in Secure Socket layer Protocol?

4 marks view

5.

    a) What is the use of digital signature? Discuss the working mechanism of Digital Signature Algorithm.

6 marks view

    b) Encrypt the message "Eight Ten" using the Hill cipher with the key . Show your calculations and the result.

4 marks view

6.

    a) Suppose there are two users Xavi and Persie who agreed to use Deffie-Hellman algorithm to exchange a key. Consider there is an eavesdropper Balotelli who attemps attack on the procedure. Show how Balotelli can perofrm Man-In-Middle attack in the Deffie-Hellman Key exchange protocol?

6 marks view

    b) What do you mean by password aging? How online dictionary attacks differ from offline attacks?

4 marks view