Introduction to Cryptography 2071

Question Paper Details
Tribhuwan University
Institute of Science and Technology
2071
Bachelor Level / Fifth Semester / Science
Computer Science and Information Technology ( CSC-313 )
( Introduction to Cryptography )
Full Marks: 60
Pass Marks: 24
Time: 3 hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Attempt all questions.

Official Answer
AI Generated Answer

AI is thinking...

1.  Answer the following questions in short (Any Five).                                         (5 × 2 = 10) 

Official Answer
AI Generated Answer

AI is thinking...

        a. Suppose a key logger program intercepts user password and is used to modify the user account. Now, justify whether it’s a violation of confidentiality, integrity, or availability or some of combination of them. 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b. How zombies differ from logic bombs? 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        c. Mention the advantages of using stream ciphers over block ciphers. 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        d. What does Euler Totient Theorem states? What is the value of Totient(15)? 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

               e. Differentiate session keys from interchange keys. 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        f. How Message Authentication Codes differ from Hash Functions? 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        g. Briefly describe SubBytes and ShiftRows in AES. 

2 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2.     a) In public key cryptosystem, each of the communicating parties, in general, should know the public keys of each other before attempting security encryptions. How this can be achieved? Write a Public Key Authority Protocol for Public-key distribution among any two users.                                                                                                                    [4] 

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b) How Kerberos Version 4 differs from Kerberos Version 5? How once per type of service approach is ensured by Kerberos Protocol.                                                           [6] 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3.     a) Configure a Vigenere table for the characters from A-H. Use the table to encrypt the text DAD CAFE EACH BABE using the key FADE.                                                      [4]

 

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b) Mention the details of logical operations used in MD4. How the Majority function in Pass 1 of MD4 works?                                                                                                       [6] 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4.     a) Encrypt the message “help” using the Hill cipher with the key . Show your calculations and the result.  [4] 

4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b) What do you mean by arbitrated digital signature? How signatures are generated using Digital Signature System?       [6]

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5.  a) How do you create public and private keys in the RSA algorithm for public-key cryptography?          (5)

OR

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

    What are the notions Public Key Ring and Private Key Ring in PGP?

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b) What is the difference between a connection and a session in SSL/TLS? Can a session include multiple connections? Explain the notions “connection state” and “session sate” in SSL/TLS. What security features apply to each?                                                               (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6.     a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them.             (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

        b) What is a certificate and why are certificates needed in public key cryptography?     (5) 

5 marks
Details
Official Answer
AI Generated Answer

AI is thinking...