IS Merged
IS Merged
/Seat No_____________
1
Seat No.: ________ Enrolment No.___________
Q.4 (a) What is MAC? State the main difference between MAC & Hash function. 03
(b) Explain hill cipher algorithm with example. 04
(c) Explain Message Digest Generation Using SHA-512. 07
OR
Q.4 (a) Explain the types of attacks are addressed by message authentication? 03
(b) What are the requirements for a Cryptographic Hash Function? 04
(c) Explain with the diagrams Basic Uses of Message Authentication code (MAC). 07
Q.5 (a) What is the role of Key Distribution Centre? Give the several techniques for the 03
distribution of public keys.
(b) Give the difference between Session key and Master key. 04
(c) Explain with neat diagram Digital Signature Algorithm. 07
OR
1
Q.5 (a) What is the role of AS and TGS in Kerberos? 03
(b) Draw X.509 certificate format. 04
(c) Explain SSL Architecture with neat diagram. 07
2
Seat No.: ________ Enrolment No.___________
(c) Explain playfair cipher. Encrypt the plain-text message “helloe jassmin” using 07
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any
‘j’ in the plaintext is replaced by ‘i’.)
Q.2 (a) Discuss Electronic Code Book mode and Counter mode in detail. 03
(b) Write difference between Block vs Stream Ciphers. Explain following terms 04
in context of cryptography: confusion and diffusion
(c) Explain DES round structure in detail. 07
OR
(c) Write a note on Advanced Encryption Standard(AES). 07
Q.3 (a) Write difference between conventional encryption and public-key encryption 03
(b) Explain man-in-the middle attack on Diffie-Hellman key exchange. 04
(c) Explain RSA algorithm in detail. Perform encryption and decryption using 07
RSA algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
OR
Q.3 (a) Explain following terms: Avalanche Effect, Cryptanalysis 03
(b) Discuss possible approaches to attack RSA. 04
(c) Explain the Deffie Hellman key exchange scheme in detail. In a Diffie- 07
Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and
primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is
the secret key they exchanged?
Q.4 Compare and contrast – MAC VS Encryption functions. In MAC, if 80-bit key
(a) 03
is used and the tag is 32 bits, then after how many rounds attacker will produce
a key, which must be the one used by the sender ?
(b) Explain working of Cipher-based Message Authentication Code and Data 04
Authentication Algorithm.
(c) Explain the working of Secure Hash Algorithm-512 in detail. 07
OR
Q.4 (a) Discuss three applications of hash functions. 03
1
(b) Discuss Hash function and its requirements. 04
(c) Write the algorithm for message authentication code based on HASH 07
functions. Also discuss its efficient implementation approach.
Q.5 Draw X.509 certificate format. Enlist the reasons to revoke the certificate
(a) 03
before expiry.
(b) Explain different ways to distribute symmetric key using symmetric and 04
asymmetric encryptions.
(c) Enlist requirements of Kerberos. Enlist and explain roles of various servers are 07
used in Kerberos. Explain through diagram, how Kerberos can communication
with other administrative domains for providing trusted services to the clients.
OR
Q.5 (a) Explain briefly: Linear and Differential Cryptanalysis 03
(b) Explain various general categories of schemes for the distribution of public 04
keys.
(c) Define Digital signature. Explain digital signature algorithm. 07
*************
2
Seat No.: ________ Enrolment No.___________
1
Seat No.: ________ Enrolment No.___________
Q.2 (a) Encrypt the message “CORONA” using Hill Cipher with key [9 4] 03
5 7
(b) Discuss different techniques for public-key distribution. 04
(c) Elaborate DES encryption with neat sketches. 07
OR
(c) Elaborate AES encryption with neat sketches. 07
1
OR
Q.4 (a) Encrypt the message “WE ARE DISCOVERED FLEE AT ONCE” 03
using Rail fence cipher with rail = 3
(b) Explain the triple DES scheme with two keys and write about proposed 04
attacks on 3DES
(c) For Diffie-Hellman algorithm, two publically known numbers are prime 07
number 23 and primitive root (g) of it is 9. A selects the random integer
4 and B selects 3. Compute the public key of A and B. Also compute
common secret key.
Q.5 (a) Illustrate variety of ways in which MAC code can be used to provide 03
Message authentication.
(b) Consider ElGamal cryptosystem in Z17 with generator 6. If the message 04
is 13 and the randomness chosen is 10, then find the ciphertext computed
using the public key 7.
(c) Discuss X.509 authentication service. 07
*************
2
Seat No.: ________ Enrolment No.___________
(b) Distinguish between passive and active security attacks? Define the type 04
of Security attack in each of the following cases:
(i) A student breaks into a professor’s office to obtain a copy of the next
day’s test.
(ii) A student gives a check for $10 to buy a used book. Later she finds
that the check was cashed for $100.
(iii) A student sends hundreds of e-mails per day to another student using
a phony return e-mail address.
(c) List and explain various block cipher modes of operation with the help of 07
diagram.
Q.2 (a) What is the purpose of S-boxes in DES? Explain the avalanche effect. 03
(b) Construct a Playfair matrix with the key “engineering”. And encrypt the 04
message “test this Balloon”.
(c) Let K = 133457799BBCDFF1 be the key in hexadecimal. Derive K1 the 07
first round sub key using a single round version of DES.
Permuted Choice One (PC-1) Permuted Choice Two (PC-2)
57 49 41 33 25 17 9 14 17 11 24 1 5 3 28
1 58 50 42 34 26 18 15 6 21 10 23 19 12 4
10 2 59 51 43 35 27 26 8 16 7 27 20 13 2
19 11 3 60 52 44 36 41 52 31 37 47 55 30 40
63 55 47 39 31 23 15 51 45 33 48 44 49 39 56
7 62 54 46 38 30 22 34 53 46 42 50 36 29 32
14 6 61 53 45 37 29
21 13 5 28 20 12 4
OR
Q.3 (a) What is a nonce? What is the difference between a session key and a 03
master key?
1
(b) Differentiate between hashing and encryption. What are the practical 04
applications of hashing?
(c) Explain Diffie Hellman key exchange algorithm with example. 07
OR
Q.3 (a) What is public key cryptography? What are the principal elements of a 03
public-key cryptosystem?
(b) Perform encryption and decryption using the RSA algorithm for p=5, 04
q=11, e=3, M=9.
(c) What do you mean by key distribution? Give at least one method for key 07
distribution with proper illustration.
Q.4 (a) Explain the triple DES scheme with two keys. 03
(b) Differentiate between Conventional encryption and Public-key 04
encryption.
(c) Discuss X.509 Certificates. 07
OR
Q.5 (a) Encrypt the message “ Asymmetric key cryptography is fun” using 03
Transposition cipher with key (3,2,6,1,5,4)
(b) Write difference between (i) block cipher and stream cipher (ii) 04
monoalphabetic cipher and polyalphabetic cipher
(c) Discuss generic model of digital signature process. 07
OR
Q.5 (a) Using the Viennese cipher, encrypt the word “explanation” using the key 03
leg.
(b) Discuss four general categories of schemes for the distribution of public 04
keys.
(c) Explain Kerberos in detail. 07
*************