Cryptography 2080 (new)

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2080 (new)
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC316 )
( Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Section A

Official Answer
AI Generated Answer

AI is thinking...

Attempt Any TWO questions. (2 * 10 = 20)

Official Answer
AI Generated Answer

AI is thinking...

1. Define discrete logarithms. How key generation, encryption and decryption is done in RSA. In a RSA cryptosystem, given p=13 and q=7, determine private key , public key, and perform encryption and decryption for the text M="hi" using o to 25 for letters from a to z.

10 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

Write down the encryption and decryption process at 2-DES and 3-DES. Explain the Fiestel cipher structure. Divide 5x^2 + 4x + 6 over GF (7).

(3+3+4) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

What are the applications of hash functions? Discuss how SHA-1 algorithm generates hash value from a given message.

(2+8) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

Section B

Official Answer
AI Generated Answer

AI is thinking...

Answer Any EIGHT questions.(8*5 = 40)

Official Answer
AI Generated Answer

AI is thinking...

4. Show encryption and decryption of "csit" using hill cipher having key  

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. Give the formal definition of Authentication system. Describe about one way and mutual Authentication system.

(2+3) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. List the stage of certificate life cycle. What are the types of firewalls?

(3+2) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. What is malicious logic? How Zombies are different from Trozan horses?

(1+4) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. How Miller Rabin test is used for primarility testing? Show whether the number 561 passes the test. 

(2.5+2.5) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9. Show that the set of integers is Ring under addition and multiplication.

(5) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. How substitution ciphers are different from transposition ciphers? Given a message M = "CSIT PROGRAM IS A HOT CAKE", encrypt M using Rail Fence cipher with rail size=3.

(2+3) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

11. Describe about IPSec. List the five services of PGP.

(3+2) marks
Details
Official Answer
AI Generated Answer

AI is thinking...

12. How does meet in middle attack work in Diffie Hellman key Exchange protocol? Explain.

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...