Introduction to Cryptography 2069

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2069
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC-313 )
( Introduction to Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

Official Answer
AI Generated Answer

AI is thinking...

1.  Answer the following questions in short (Any Five).                                         (5 × 2 = 10) 

Official Answer
AI Generated Answer

AI is thinking...

        a. How monoalphabetic substitution differs from polyalphabetic. Briefly define with suitable example.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. What are the components of authentication system? Give an example of authentication system.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. What do you mean by avalanche effect?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. How chosen plaintext attack differs from chosen ciphertext attack?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        e. What do you mean by multiplicative inverse? Find multiplicative inverse of each nonzero elements in Z11.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. Even though we have a strong algorithm like 3-DES, still AES is preferred as a reasonable candidate for long term use. Why?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. Give an example for a situation that compromise in confidentiality leads to compromise in integrity.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2.     a) Consider a Deffie-Hellman scheme with a common prime p = 11 and a primitive root g= 2.

i. Show that 2 is a primitive root of 11.

ii. If user A has public key Ya = 9, what is A’s private key Xa?

iii. If user B has public key Yb = 3, what is shared key K, shared with A.         (3x2=6) 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Construct a playfair matrix with the key “KEYWORD”. Using this matrix encrypt the   message “WHY DON’T YOU”.                                                                                            (4)

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3.     a) How Trojan horse differs from viruses? Discuss about possible types of Trojan horses.                                                                                                                                    (2+3)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Does Kerberos protocol ensures authentication and confidentiality in secure system? Explain.                                                                                                                              (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4.     a) How Hash functions differ from MAC? Given a message m, discuss what arithmetic and logical functions are used by MD4 to produce message digest of 128 bits.           (2+4) 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Discuss the five principle services provided by PGP protocol.                                    (4)

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5.     a) What is the purpose of S-Boxes in DES? Prove that DES satisfies complementation property?                                                                                                                            (6) 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Given the plaintext “ABRA KA DABRA”, compute the ciphertext for                       (4)

i. The Ceaser cipher with key = 8

ii. The Railfence cipher with rails = 3

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6.     a) What do you mean by digital signature? How digital signatures can be enforced using encryptions? Illustrate with an example.                                                                       (1+5)

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Determine whether the integers 105 and 294 are relatively prime. Explain your answer using Euclidean algorithm.                                                                                                (4)

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...