Introduction to Cryptography 2070

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2070
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC-313 )
( Introduction to Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

Official Answer
AI Generated Answer

AI is thinking...

1.  Answer the following questions in short (Any Five).                                         (5 × 2 = 10) 

Official Answer
AI Generated Answer

AI is thinking...

        a. Difference between monoalphabetic substitution ciphers and polyalphabetic substitution ciphers.

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. What are the two building blocks of all classical ciphers?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. Des encryption was broken in 1999. Does that make this an unimportant cipher? Why do you think that happened?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. What does a field have, that an integral domain does not? Why is Zn not an integral domain?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        e. Does a field contain a multiplicative inverse for every element of the field?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. What are the four steps that are executed in a single round of AES processing?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. What is a hash code? Why can a hash function not be used for encryption?

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2.     a) What is Euclid’s algorithm for finding the GCD of two numbers? Explain.                (5)

OR

What is Euler’s theorem? What is the totient of a prime number? 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

          b) Calculate the result of the following if the polynomial are over GF(2):                       (5)

    (x4 + x2 + x + 1) + (x3+1)

    (x4 + x2 + x + 1) – (x3+1)

    (x4 + x2 + x + 1) x (x3+1)

    (x4 + x2 + x + 1) / (x3+1)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3.     a) Let’s go back to the first step of processing in each round of AES. How does one look up the 16x16 S-box table for the byte-by-byte substitution?                                             (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) What do you mean by man-in middle attack? Is man-in-middle attack possible in Deffie-Hellman? How?                                                                                                      (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4.     a) There are two aspects to a secure communication link: authentication and confidentiality. How do you understand these two words? Does the Kerberos protocol give us both?                                                                                                                      (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) Miller-Rabin test says that if a candidate integer n is prime, it must satisfy one of two special conditions. What are those two conditions?                                                          (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5.     a) How do you create public and private keys in the RSA algorithm for public-key cryptography?                                                                                                                    (5)

                                                OR

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

What are the notions Public Key Ring and Private Key Ring in PGP? 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

b) What is the difference between a connection and a session in SSL/TLS? Can a session include multiple connections? Explain the notions “connection state” and “session sate” in SSL/TLS. What security features apply to each?                                                          (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6.     a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them.                                                                                                                    (5)

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    b) What is a certificate and why are certificates needed in public key cryptography? (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...