Cryptography 2076 (new)

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2076 (new)
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

                                          Section A

Attempt Any Two questions.                            (2 x10 =20)

Official Answer
AI Generated Answer

AI is thinking...

1. Among monoalphabetic and polyalphabetic cipher, which one is more vulnerable? Justify your statement. Which types of keys are considered as weak keys in DES? Explain round operations in IDEA.

10 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2. State the Fermat's theorem with example. Given the prime number p=29 and the primitive root g=8, private key of sender with X=9  and random integer K=11, encrypt the message m=13 using Elgamal cryptosystem.

10 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. Compare the SHA parameters between SHA-1 and SHA-2 family. Decrypt the cipher text DRJI with key  using Hill cipher.

10 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

                                          Section B

Attempt Any Eight questions.                            (8 x5 =40)

Official Answer
AI Generated Answer

AI is thinking...

4. Define discrete logarithm. Explain the procedure of sharing the secret key in Diffie Hellman.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. Distinguish between stream cipher and block cipher. Encrypt the message WE ARE IN SAME RACE UNTIL OUR LIVE END using Rail fence cipher using 4 as number of rails.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. Define digital signature. Describe the approaches of DSS.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. What is the task of firewall? List the elements of X.509.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. How does the nature of worms differ with virus? Define PKI with its architecture model.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9. Explain the procedure of mix column transformation in AES with an example.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. what is the role of prime number in Euler totient function? Find the GCD of 12 and 16 using Euclidean algorithm.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

11. Write down any two limitations of MAC? What does policy and mechanism mean in cryptography? Describe with a scenario.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

12. Write short notes on (Any Two)

        a. Classes of intruder

        b. SSL

        c. Dos Attack

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...