Cryptography 2076

Tribhuwan University
Institute of Science and Technology
2076
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1. Answer following questions in short (any five)

        a. How MAC differs from Hash? Is authentication and authorization refers to same term or different? Justify.

2 marks view

        b. Differentiate between virus and worms.

2 marks view

        c. What is the importance of Trap Door function in cryptography?

2 marks view

        d. How many rounds are used in AES and what does the number of rounds depend on?

2 marks view

        e. What does Zn refer to in cryptography? Illustrate with an example.

2 marks view

        f. List the five services that PGP operation is based on.

2 marks view

        g. John obtains Peter's credit card number and performs shopping. Does it violate confidentiality or integrity or both? Justify.

2 marks view

2. a. What is Fermat's Little theorem? What is the totient of a prime number? Give an example.

                OR

    Define primitive root of a prime number with a suitable example,

5 marks view

    b. Find the multiplicative inverse of 11 in Z26 using extended Euclidean algorithm.

5 marks view

3. a. Find the result of the following operations.

        i) 27 mod 5        ii) 36 mod 12        iii) -18 mod 14        iv) -7 mod 10        v) -13 mod 7

5 marks view

    b. How can RSA can be used for generating public and private key? Explain.

5 marks view

4. a. Encrypt the message "computing for human life" to playfair cipher using key "BSCCSIT".

5 marks view

    b. Explain about the working mechanism of Kerberos.

5 marks view

5. a. Does it possible to design collision free hash function? What does birthday attack refers to? Explain.

5 marks view

            OR

    What is the role of SSL Record Protocol in SSL/TLS? Explain.

5 marks view

    b. Describe the "mix columns" transformation that constitutes the third step in each round of AES.

5 marks view

6. a. Define digital signature. How certificates are issued in PKI trust models? Explain.

5 marks view

    b. List the modes of operation in cryptography? Describe the Fiestel cipher structure.

5 marks view