Ccs-Iat-3-Answer Key
Ccs-Iat-3-Answer Key
5113
NO. :
3. How does the Chinese Remainder Theorem contribute to efficient modular arithmetic in
encryption and decryption processes?
The Chinese Remainder Theorem (CRT) contributes to efficient modular arithmetic in
encryption and decryption by allowing large computations to be broken down into smaller,
manageable calculations. Specifically, it enables operations on large numbers (like those used in
RSA encryption) to be done more efficiently as follows:
1. Decomposition of Large Moduli: CRT expresses a computation modulo a large number
NNN (where N=p×qN = p \times qN=p×q, with ppp and qqq as prime factors) as two
separate computations modulo ppp and qqq.
2. Reduced Complexity: Instead of exponentiating a large number modulo NNN, CRT
allows these operations to be performed separately modulo ppp and qqq, which reduces
the size of the numbers and thus the complexity.
3. Reconstruction of Results: Using CRT, the results from the modular computations with
ppp and qqq can be efficiently combined to yield the final result modulo NNN.
This division of work accelerates encryption and decryption processes, especially in systems like
RSA, by making modular exponentiation more computationally feasible.
REG.
5113
NO. :
6. Find at least two points lies in the elliptic curve Y2=X3+2X+3(MOD 5).
The points that lie on the elliptic curve y2≡x3+2x+3mod 5 include:
1. (1,1)
2. (1,4)
Additionally, other points on the curve are
(2,0) (3,1), (3,4), and (4,0).
Thus, at least two points satisfying the curve equation are
(1,1) and (1,4).
Part-B
Answer any two from the following questions
7. Prove that Euler’s Totient value of any prime number (p) is p – 1 and the Euler’s Totient
value of the non-prime number (n) is (p-1)*(q-1)where p*q are prime factor of n. (16)(K3)
REG.
5113
NO. :
8. (i) Perform encryption and decryption using RSA algorithm for p=17, q=11, e=7 and
M=88. (8)
(K3)
(ii) State Chinese Remainder theorem and find X for the given set of congruent equations
using CRT. X=2(mod 3) X=3(mod 5) X=2(mod 7).
(8)(K3)
(ii) Explain Asymmetric Key Ciphers in detail. List the advantages and disadvantages of
Public Key algorithm. Compare public key and private key algorithm. (8)(K2)
Definition: Asymmetric key ciphers, also known as public key cryptography, utilize a pair of keys
for encryption and decryption: a public key and a private key. The public key is widely
distributed, while the private key is kept secret. This mechanism allows secure communication
and authentication without needing to share secret keys.
How It Works:
1. Key Generation: A key pair is generated. The public key can be shared with anyone,
while the private key is kept secret by the owner.
2. Encryption:
o To send a secure message, the sender encrypts the message with the recipient’s
public key. Only the recipient can decrypt it with their corresponding private key.
3. Digital Signatures: The sender can also create a digital signature by encrypting a hash of
the message with their private key. The recipient can verify the signature using the
sender’s public key.
4. Key Exchange: Asymmetric algorithms can be used to securely exchange symmetric
keys, which can then be used for faster symmetric encryption of the actual message.
DSA (Digital Signature Algorithm): Primarily used for digital signatures rather than
encryption.
Advantages:
1. Secure Key Distribution: No need to exchange private keys over a potentially insecure
channel.
2. Authentication: Digital signatures enable verification of the sender's identity and message
integrity.
3. Scalability: Users can share their public keys without needing to share secret keys,
making it easier to manage numerous users.
4. Non-repudiation: Digital signatures provide proof of the origin of a message, preventing
the sender from denying sending it.
Disadvantages:
Conclusion
REG.
5113
NO. :
Asymmetric key ciphers play a vital role in modern cryptography, particularly in secure
communications, authentication, and digital signatures. They address many of the limitations
associated with symmetric key cryptography, particularly in terms of key distribution and
management. However, they also come with performance trade-offs and challenges that require
careful consideration when designing secure systems. Understanding both public key and private
key algorithms, along with their advantages and disadvantages, is essential for implementing
effective cryptographic solutions.
Part-C (Compulsory)
Answer the questions [1 x 16 = 16 Marks]
10. (i) With a neat sketch, explain the Elliptic Curve Cryptography. (K2)(6)
Elliptic Curve Cryptography (ECC) is a modern cryptographic technique that uses the
mathematics of elliptic curves over finite fields to provide secure communication. Here's a
simplified explanation along with a neat sketch to illustrate the concept.
y2=x3+ax+b where a and b are constants that define the specific curve. The graph of this
equation forms a symmetrical shape (the "elliptic curve").
2. Points on the Curve: The solutions (x,y) that satisfy the equation form a set of points on
the curve. In ECC, these points represent the elements of the finite field used for
cryptography.
3. Group Operation: Points on the elliptic curve can be added together using a defined
geometric process. This operation is associative and has an identity element, making the
set of points a group.
4. Private and Public Keys: In ECC, a user generates a private key (a random integer) and a
public key (a point on the elliptic curve obtained by multiplying a base point GGG by the
private key).
5. Security: The security of ECC relies on the difficulty of the Elliptic Curve Discrete
Logarithm Problem (ECDLP), which is hard to solve. It means that while it's easy to
compute the public key from the private key, it’s computationally infeasible to derive the
private key from the public key.
Sketch of ECC
Here's a sketch illustrating the basic concepts of Elliptic Curve Cryptography (ECC):
1. Elliptic Curve: The blue curves represent the elliptic curve defined by the equation
y2=x3−x+1.
2. Base Point (G): The red point marks a designated base point G on the curve, which is
used for generating keys.
3. Public Key (P): The green point indicates the public key P, calculated by multiplying the
base point G by a private key k (in this case, represented as a multiple of G).
4. Line Representation: The dashed red line illustrates the relationship between the base
point GGG and the public key P through scalar multiplication.
(ii) User A and B use the Diffie Hellman key exchange technique with a common
Prime q=71 and a primitive root ɑ=7.
a) If user A has private key XA=5, what is A’s public key YA?
b) If user B has private key XB=12, what is B’s public key YB?
c) What is the shared secret key? (K3)(CO3)(10)