Cryptography 2074

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2074
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1. Answer the following questions in short (Any Five).                                         

Official Answer
AI Generated Answer

AI is thinking...

        a. What are the typical phases of operation of virus?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. Find Multiplicative inverse of each nonzero elements in Z5.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. Why Hash Functions are often known as one way functions?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. how Vignere Cipher can be used to ensure poly-alphabetic substitution?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        e. Using extended Euclidean Algorithm, find multiplicative inverse of 550 and 1769.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. Define PKI Trust Model.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. What do you mean by odd round in IDEA?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2.

    a) What do you mean by transposition cipher? Decrypt the ciphertext UIESTNVRIY using the Railfence cipher using the rail size 2.

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Consider the message blocks m1, m2, m3. If the Cipher Block Chaining mode DES encryption can be expressed as  Now, write the expressions for the DES decryption to extract each of the message blocks m1, m2, m3.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3.

    a) How padding is done in MD5? What enhancements in MD4 are done to get better hash function MD5?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Construct a playfair matrix with the key CRYPTO. Using this matrix encrypt the message "have a nice day".

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4.

    a) In a RSA system, a user named Messi has chosen the primes 5 and 11 to create a key pair. Now show the generation of public key pair (eMessi, n) and private key pair (dMessi, n). Show how Messi can encrypt the message "Soccer" using his own public key.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) What is the role of SSL Handshake Protocol in Secure Socket layer Protocol?

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5.

    a) What is the use of digital signature? Discuss the working mechanism of Digital Signature Algorithm.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Encrypt the message "Eight Ten" using the Hill cipher with the key . Show your calculations and the result.

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6.

    a) Suppose there are two users Xavi and Persie who agreed to use Deffie-Hellman algorithm to exchange a key. Consider there is an eavesdropper Balotelli who attemps attack on the procedure. Show how Balotelli can perofrm Man-In-Middle attack in the Deffie-Hellman Key exchange protocol?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) What do you mean by password aging? How online dictionary attacks differ from offline attacks?

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...