Cryptography 2022
Cryptography 2022
:
18CSPB0
B.E. DEGREE– APRIL 2022 –EXAMINATIONS
BRANCH: COMPUTER SCIENCE AND ENGINEERING
CRYPTOGRAPHY
Duration : 3Hours Maximum: 100 Marks
SPECIAL INSTRUCTIONS: Data sheets for AES and DES to be provided.
Answer All Questions
PART – A (10 x 2 =20) CO Marks
A1. Define non-repudiation security service. CO1 (2)
A2. List the various security mechanisms. CO1 (2)
A3. Explain one-time pad encryption algorithm. CO1 (2)
A4. Recite Fermat’s theorem. CO2 (2)
A5. Give example for groups, rings and fields. CO2 (2)
A6. Describe cipher block chaining mode. CO3 (2)
A7. Differentiate stream cipher and block cipher. CO3 (2)
A8. Describe the steps in RC4 key stream generation. CO4 (2)
A9. Memorize the concept of cryptographic primitives used in bitcoin transactions . CO6 (2)
A10. Describe dual signature in SET. CO6 (2)
Plain text:
4D 41 4E 54
45 47 43 49
53 45 52 4F
53 45 50 4E
54 53 50 31 Key :
45 43 49 32
41 4F 41 33
4D 52 4E 34
C5. Solve the following using Elliptic curve cryptography: CO4 (15)
Given : In the elliptic curve E(1,1) over the GF(11)
i) Find the equation of the curve.
ii) Find all the points on the curve.
iii) Check if the point (3,8) falls on the curve.
iv) Encrypt the plain text (4,6).
v) Calculate the public key and the private key.
(OR)
C6. a. Alice and Bob use the Diffie–Hellman key exchange technique with a common CO4 (8)
prime q = 7 and a primitive root a = 15.
i. Calculate the public key YA, if Alice has a private key XA = 6.
ii. Calculate the public key YB, if Bob has a private key XB = 4.
iii. Compute the shared secret key between Alice and Bob.
b. In a RSA cryptosystem, user A uses two prime numbers p = 13 and q = 17 to CO4 (7)
generate her public and private keys. Calculate the private key of A, if the
public key of A is 35 and encrypt the plain text message m=15.
C7. a. In order to ensure security while transactions it is essential to authenticate CO5 (10)
the message before communication using any signing algorithm and verify
the same at receiver side .Show how digital signature can be generated
using DSS with the following parameters and verify the signature.
H(m)=3,h=2
P=7,q=3,k=2,x=5
b. Demonstrate the various ways in which a hash code can be used to provide CO5 (5)
message authentication for Symmetric key encryption to ensure
confidentiality and authentication.
(OR)
C8. Authentication of a computer program in plaintext is an attractive service. The CO5 (15)
computer program can be executed without having to decrypt it every time, which
would be wasteful of processor resources. However, if a message authentication
code were attached to the program, it could be checked whenever assurance was
required of the integrity of the program. Demonstrate the use of Message
authentication code using various stages of MD5 algorithm for the above scenario.
***************