We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
Dat
Duration: 1 hour
N a Ni of Questions: 3 in 2 page(s)
Attempt the following questions. ‘Total Points: 30 pts
Question: Tine of False Gp)
"1. Symmetric encryption remains by far the most widely used of the two types of encryption.
2, Symmetric encryption is a form of eryptosystem in which encryption and decryption are per- ~
formed using different keys. It is also known as non- conventional encryption.
$. With the use of symmetric encryption, the principal security problem is maintaining the secrecy.
of the key.
4. The process of converting from plaintext 10 ciphertext is known as deciphering or decryption.
. The most widely used cipher is the Data Encryption Standard.
6, DES uses a 56-bit block and a 64-bit key.
7. One criteria for an S-box is: “ff two inputs to an S-box differ in exactly one bit, the outputs
smust also differ in exactly one bit.”
8. The heart of a Feistel block cipher is the function F, which relies on the use of $-boxes.
9. AES uses a Feistel suructure.
10.DES is a block cipher intended to replace AES for commercial applications
Question2: Problem Solving (13 pts)
1. Inah attack scenario, we assume that the attacker Oscar manages somehow to provide Al-
ice with a few pieces of plaintext that she encrypts. Show how Oscar can break the affine
cipher by using two pairs of plaintext-ciphertext, (a1, y1)and (22, Y2). What is the condi-
tion for choosing «ry and 2:2?
Assume an OTP like encryption with a short key of 128 bit. This key is then being used pe~
riodically to enerypt large volumes of data, Describe how an att 2 i
sel an attack works that breaks this
We will now analyze a pseudorandom number sev by a LF
quence generated =
( ok } a yy a LFSR character-
a) What is the sequence generated from the initialization vector
(so = 1,81 =0, 8 = 0)‘c) How are the two sequences related?
estion3: Problem Solving (12 pts)
‘Question
1. Compute in GF (2°):
(at +e+1)+(0" tao 4a * + 2°)
where the irreducible polynomial is the one used by AES, P(z) = 2 + x 4+a3 +2 + Land
the multiplicative inverse of (x7 + p+e¢e)isattatotl
2. Show that DES decryption is, in fact, the inverse of DES encryption.