Explain following terms: non-repudiation, integrity, masquerade
[3 marks]Encrypt the message “attc” with the following key using Hill cipher.
[4 marks]Explain playfair cipher. Encrypt the plain-text message “helloe jassmin” using playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any ‘j’ in the plaintext is replaced by ‘i’.)
[7 marks]Discuss Electronic Code Book mode and Counter mode in detail.
[3 marks]Write difference between Block vs Stream Ciphers. Explain following terms in context of cryptography: confusion and diffusion
[4 marks]Explain DES round structure in detail.
[7 marks]Write a note on Advanced Encryption Standard(AES).
[7 marks]Write difference between conventional encryption and public-key encryption
[3 marks]Explain man-in-the middle attack on Diffie-Hellman key exchange.
[4 marks]Explain RSA algorithm in detail. Perform encryption and decryption using RSA algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
[7 marks]Explain following terms: Avalanche Effect, Cryptanalysis
[3 marks]Discuss possible approaches to attack RSA.
[4 marks]Explain the Deffie Hellman key exchange scheme in detail. In a Diffie- Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is the secret key they exchanged?
[7 marks]Compare and contrast – MAC VS Encryption functions. In MAC, if 80-bit key is used and the tag is 32 bits, then after how many rounds attacker will produce a key, which must be the one used by the sender ?
[3 marks]Explain working of Cipher-based Message Authentication Code and Data Authentication Algorithm.
[4 marks]Explain the working of Secure Hash Algorithm-512 in detail.
[7 marks]Discuss three applications of hash functions.
[3 marks]Discuss Hash function and its requirements.
[4 marks]Write the algorithm for message authentication code based on HASH functions. Also discuss its efficient implementation approach.
[7 marks]Draw X.509 certificate format. Enlist the reasons to revoke the certificate before expiry.
[3 marks]Explain different ways to distribute symmetric key using symmetric and asymmetric encryptions.
[4 marks]Enlist requirements of Kerberos. Enlist and explain roles of various servers are used in Kerberos. Explain through diagram, how Kerberos can communication with other administrative domains for providing trusted services to the clients.
[7 marks]Explain briefly: Linear and Differential Cryptanalysis
[3 marks]Explain various general categories of schemes for the distribution of public keys.
[4 marks]Define Digital signature. Explain digital signature algorithm.
[7 marks]