List and explain various types of attacks?
[3 marks]What is Hill Cipher? Generate a Cipher text for plain text “hi” using key “jefh” using hill cipher.
[4 marks]List various mode of cryptographic operation. Explain any one with the help of diagram.
[7 marks]List advantages of asymmetric cryptography over symmetric key cryptography.
[3 marks]Explain encryption and decryption of RSA algorithm
[4 marks]Explain avalanche effect in DES algorithm.
[7 marks]Does DES algorithm Secure? Discuss security of DES.
[7 marks]List the requirements of public key cryptography.
[3 marks]List application of RSA algorithm.
[4 marks]Discuss security of Diffie Hellman Key exchange algorithm with the help of example.
[7 marks]Using diagram explain how RSA algorithm can be used to digitally sign the message.
[3 marks]Compute public key and private key of RSA with p-11, q=17 and e = 7.
[4 marks]Compute Inverse of b=550 mod m=1759 using Euclid algorithm
[7 marks]Explain cryptanalysis attack on cryptographic hash function.
[3 marks]Explain pre-image resistance and second pre-image resistance.
[4 marks]Write a note on birthday attack.
[7 marks]What is collision resistance property of hash function?
[3 marks]Explain a simple hash function and its limitation.
[4 marks]What is block size and message digest size in SHA 512? With the help of diagram explain a round of SHA-512 algorithm
[7 marks]Explain mutual authentication using symmetric key cryptography
[3 marks]Compare authentication and authorization.
[4 marks]Explain Schnorr algorithm for digital signature.
[7 marks]Explain one way authentication using symmetric key cryptography
[3 marks]Compare link encryption and end to end encryption
[4 marks]Explain NIST Digital signature algorithm
[7 marks]