Define the following terms:
[3 marks]Non-repudiation (ii) Data integrity (iii) Confidentiality
[ marks]Distinguish between passive and active security attacks? Define the type of Security attack in each of the following cases:
[4 marks]Astudent breaks into a professor’s office to obtain a copy of the next day’s test. (ii) Astudent gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100. (iii) Astudent sends hundreds of e-mails per day to another student using a phony return e-mail address.
[ marks]List and explain various block cipher modes of operation with the help of diagram.
[7 marks]What is the purpose of S-boxes in DES? Explain the avalanche effect.
[3 marks]Construct a Playfair matrix with the key “engineering”. And encrypt the message “test this Balloon”.
[4 marks]Let K = 133457799BBCDFF1 be the key in hexadecimal. Derive K1 the first round sub key using a single round version of DES. Permuted Choice One (PC-1) Permuted Choice Two (PC-2)
[7 marks]Let M =3243F6A8885A308D313198A2E0370734 be the plain text message and K=2B7E151628AED2A6ABF7158809CF4F3C be the key in hexadecimal. Perform the following operation using AES.
[7 marks]Add round key.
[ marks]Shift row transformation on output of (a)
[ marks]What is a nonce? What is the difference between a session key and a master key?1
[3 marks]Differentiate between hashing and encryption. What are the practical applications of hashing?
[4 marks]Explain Diffie Hellman key exchange algorithm with example.
[7 marks]What is public key cryptography? What are the principal elements of a public-key cryptosystem?
[3 marks]Perform encryption and decryption using the RSA algorithm for p=5, q=11, e=3, M=9.
[4 marks]What do you mean by key distribution? Give at least one method for key distribution with proper illustration.
[7 marks]Explain the triple DES scheme with two keys.
[3 marks]Differentiate between Conventional encryption and Public-key encryption.
[4 marks]Discuss X.509 Certificates.
[7 marks]Why not Double DES? What is a meet-in-the-middle attack?
[3 marks]Discuss message digest generation using SHA-512.
[4 marks]What is message authentication code? What is the difference between a Message authentication code and a one-way hash function? Write the basic uses of Message authentication code.
[7 marks]Encrypt the message “ Asymmetric key cryptography is fun” using Transposition cipher with key (3,2,6,1,5,4)
[3 marks]Write difference between (i) block cipher and stream cipher (ii) monoalphabetic cipher and polyalphabetic cipher
[4 marks]Discuss generic model of digital signature process.
[7 marks]Using the Viennese cipher, encrypt the word “explanation” using the key leg.
[3 marks]Discuss four general categories of schemes for the distribution of public keys.
[4 marks]Explain Kerberos in detail.
[7 marks]