Cryptography 2075

Tribhuwan University
Institute of Science and Technology
2075
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1. Answer following questions in short (any five)

        a. The larger the size of key space, the more secures a cipher? Justify your answer.

2 marks view

        b. Differentiate between virus and Trojan horse.

2 marks view

        c. What is weak collision resistance property of hash function?

2 marks view

        d. Differentiate between transposition cipher and substitution cipher?

2 marks view

        e. What does Zn refer to in cryptography? Illustrate with an example.

2 marks view

        f. What is the additive inverse of 2 in Z10?

2 marks view

        g. John copies Mary’s homework. Does it violate confidentiality or integrity or both? Justify.

2 marks view

2. a) What do you mean by “Fiestel Structure for Block Ciphers”? Explain.                       

5 marks view

                            OR

How can a number can be tested for primality testing using Miller-Rabin algorithm? Explain.

5 marks view

    b) Divide 5x2+4x+6 by 2x+1 over GF(7).

5 marks view

3. a) Find the result of the following operations.            

    (i) 2 mod 5     (ii) 33 mod 3     (iii) -13 mod 10     (iv) -23 mod 10     (v) -8 mod 7

5 marks view

    b) How can Diffie-Hellman can be used for key exchange? Explain.                               

5 marks view

4. a) Encrypt the message “machine passed turing test” to playfair cipher using key “ALANTURING”.                                                                                                             

5 marks view

    b) What is the digital signature for, authentication of confidentiality? Justify your answer. What does security handshake pitfall refer to?                                                                  

5 marks view

5. a) Explain about PGP.                                                                                                 OR

      What is the role of the SSL Record Protocol in SSL/TLS? Explain.                             
5 marks view

    b) Describe the method for generating Round Constant table in AES algorithm in Add Round Key phase. Assume the number of rounds is 10.                                                   

5 marks view

6. a) Is hash and MAC resemble the same meaning? Explain how SHA generates 160 bit digest value?                                                                                                                      

5 marks view

    b) Define field. Differentiate between public key cryptography and private key cryptography.                                                                                                                     

5 marks view