Introduction to Cryptography 2067

Tribhuwan University
Institute of Science and Technology
2067
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC-313 )
( Introduction to Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

1.  Answer the following questions in short (Any Five).                                         (5 × 2 = 10) 

        a. List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

2 marks view

        b. The larger the size of the key space, the more secure a cipher? Justify your answer.

2 marks view

        c. Explain the concepts of diffusion and confusion as used in DES.

2 marks view

        d. What are the characteristics of a stream cipher?

2 marks view

        e. How afraid should you be of viruses and worms?

2 marks view

        f. What do you mean when we say that a pseudorandom number generator is cryptographically secure?

2 marks view

        g. How many rounds are used in AES and what does the number of rounds depend on?

2 marks view

2.    a) The notation Zn stands for the set of residues. What does that mean? Why is Zn not a finite field? Explain.         (5) 

5 marks view

       b) Find the multiplicative inverse of each nonzero element in Zn.                                   (5)

5 marks view
            OR

Complete the following equalities for the numbers in GG(2):

1+1 = ?

1-1 = ?

-1 = ?

1*1 = ?

1 * -1 = ? 

5 marks view

3.    a) What are the steps that go into the construction of the 16 × 16 S-box lookup table for AES algorithm?                                                                                                                 (5)

5 marks view

       b) In RSA algorithm, what is necessary condition that must be satisfied by the modulus n chosen for the generation of the public and private key pair? Also, is the modulus made public?                                                                                                                                (5)

OR

5 marks view

How is the sender authentication carried out in PGP?                                                (5) 

5 marks view

4.     a) What sort of secure communication applications is the Kerberos protocol intended for? Explain.                                                                                                                              (5) 

5 marks view

      b) What is Fermat's Little Theorem? What is the totient of a number?                             (5) 

5 marks view

5.     a) Miller-Rabin test for primality is based on the fact that there are only two numbers in Zp that when squared give us 1. What are those two numbers?                                       (5)

OR

5 marks view

What is discrete logarithm and when can we define it for a set of numbers?             (5) 

5 marks view

         b) What is the Diffie-Hellman algorithm for exchanging a secret session key?               (5) 

5 marks view

6.     a) We say that SSL/TLS is not really a single protocol, but a stack of protocols. Explain. What are the different protocols in the SSL/TLS stack?                                                   (5) 

5 marks view

      b) What is the relationship between ''hash'' as in ''hash code'' or ''hashing function'' and ''hash'' as in a ''hash table''?                                                                                                (5)  

5 marks view