Introduction to Cryptography 2067

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2067
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC-313 )
( Introduction to Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

Official Answer
AI Generated Answer

AI is thinking...

1.  Answer the following questions in short (Any Five).                                         (5 × 2 = 10) 

Official Answer
AI Generated Answer

AI is thinking...

        a. List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. The larger the size of the key space, the more secure a cipher? Justify your answer.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. Explain the concepts of diffusion and confusion as used in DES.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. What are the characteristics of a stream cipher?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        e. How afraid should you be of viruses and worms?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. What do you mean when we say that a pseudorandom number generator is cryptographically secure?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. How many rounds are used in AES and what does the number of rounds depend on?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2.    a) The notation Zn stands for the set of residues. What does that mean? Why is Zn not a finite field? Explain.         (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

       b) Find the multiplicative inverse of each nonzero element in Zn.                                   (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

            OR

Complete the following equalities for the numbers in GG(2):

1+1 = ?

1-1 = ?

-1 = ?

1*1 = ?

1 * -1 = ? 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3.    a) What are the steps that go into the construction of the 16 × 16 S-box lookup table for AES algorithm?                                                                                                                 (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

       b) In RSA algorithm, what is necessary condition that must be satisfied by the modulus n chosen for the generation of the public and private key pair? Also, is the modulus made public?                                                                                                                                (5)

OR

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

How is the sender authentication carried out in PGP?                                                (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4.     a) What sort of secure communication applications is the Kerberos protocol intended for? Explain.                                                                                                                              (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

      b) What is Fermat's Little Theorem? What is the totient of a number?                             (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5.     a) Miller-Rabin test for primality is based on the fact that there are only two numbers in Zp that when squared give us 1. What are those two numbers?                                       (5)

OR

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

What is discrete logarithm and when can we define it for a set of numbers?             (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

         b) What is the Diffie-Hellman algorithm for exchanging a secret session key?               (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6.     a) We say that SSL/TLS is not really a single protocol, but a stack of protocols. Explain. What are the different protocols in the SSL/TLS stack?                                                   (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

      b) What is the relationship between ''hash'' as in ''hash code'' or ''hashing function'' and ''hash'' as in a ''hash table''?                                                                                                (5)  

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...