Define substitution technique in cryptography. List various substitution technique and discuss any one with an example.
[3 marks]What is the objective of attacking an encryption system? Write the two approaches to attack a conventional encryption scheme.
[4 marks]List various modes of operations of block cipher. Explain any three of them briefly.
[7 marks]Define 1) Authentication 2) Data integrity 3) Data Confidentiality
[3 marks]Construct a Playfair matrix with the key “engineering”. And encrypt the message “test this process”.
[4 marks]Describe the Diffie-Hellman Key Exchange algorithm and how it enables secure key exchange between two parties. Explain the man-in-the-middle attack and how it can compromise the security of Diffie-Hellman.
[7 marks]Discuss RSA algorithm, focusing on its computational aspects and security. Discuss how public and private keys are generated and used in encryption and decryption.
[7 marks]What is the purpose of the State array? How many bytes in State are affected by ShiftRows?
[3 marks]Explain the following properties of hash function
[4 marks]One way property (ii) Weak collision resistance
[ marks]Explain the structure of the Advanced Encryption Standard (AES), its transformation functions, and the key expansion process.
[7 marks]How does a Message Authentication Code (MAC) ensure message integrity and authenticity?
[3 marks]What is the difference between direct and arbitrated digital signature?
[4 marks]Briefly describe the main components of the Data Encryption Standard (DES) algorithm.1
[7 marks]Briefly define the monoalphabetic cipher.
[3 marks]Describe the Elgamal digital signature schemes.
[4 marks]Discuss Kerberos as a secure authentication protocol. Explain its key components and how it protects against replay attacks.
[7 marks]What are the essential ingredients of a symmetric cipher?
[3 marks]Describe the Schnorr digital signature schemes.
[4 marks]Explain the process of remote user authentication using symmetric encryption. How does it ensure secure communication between parties?
[7 marks]What is a nonce? What is the difference between a session key and a master key?
[3 marks]Discuss key expansion process of DES algorithm.
[4 marks]Discuss the Secure Hash Algorithm (SHA) family. Explain how SHA functions are used in ensuring data integrity and their role in cryptographic applications.
[7 marks]Explain the avalanche effect.
[3 marks]Briefly describe the role of X.509 certificates in secure communication.
[4 marks]What is public key cryptography? Explain the concept behind the public key cryptography and Compare it with conventional cryptography.
[7 marks]