Define Cryptography and Cryptanalysis. Draw conventional cryptosystem.
[3 marks]List and explain various types of attacks on encrypted message.
[4 marks]Explain single round function of DES with suitable diagram.
[7 marks]Differentiate Symmetric and Asymmetric key cryptography.
[3 marks]Use playfair algorithm with key “monarchy” and encrypt the text “crypt tool”.
[4 marks]Explain various steps of AES with diagram.
[7 marks]Which security goal is achieved with SHA-1 algorithm? Explain steps of SHA-1.
[7 marks]Explain rail fence Cipher technique
[3 marks]Explain the terms diffusion and confusion.
[4 marks]Explain NIST digital Signature algorithm
[7 marks]Differentiate session key and master key.
[3 marks]Explain different characteristics of hash function.
[4 marks]List various modes of operations in block cipher encryption and explain any two.
[7 marks]Explain Euler’s totient function with example.
[3 marks]Pand Qare two prime numbers. P=7, and Q=17. Take public key E=5. If plain text value is 6, then what will be cipher text value according to RSA algorithm?
[4 marks]What is a nonce? Explain the key distribution scenario if Awishes to establish logical connection with B (Aand Bboth have a master key shared with KDC).
[7 marks]Discuss the triple DES scheme with two keys and its limitations.
[3 marks]Explain Encryption and decryption in RSA algorithm.
[4 marks]Explain Deffie Hellman key exchange scheme in detail.
[7 marks]Write the elements of X.509 certificates.
[3 marks]What steps sending PGP(pretty good privacy) perform?
[4 marks]Explain Kerberos in detail.
[7 marks]Describe various ways to distribute public key in public key cryptography.
[3 marks]Explain the secure socket layer handshake protocol action.
[4 marks]How encapsulating security payload help in IP security? Explain various fields in Encapsulating security payload packet.
[7 marks]