You are on page 1of 1

B.E.

, Semester VII, EXTC

Data Compression and Encryption


Internal Assessment Test I Question Bank (2016)
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)
23)
24)
25)

26)
27)
28)

29)
30)

What are the metrics used to evaluate compression performance?


Define average codeword length and coding efficiency.
Consider a memoryless discrete source with symbols a, b, c, d, and e with probabilities 0.35, 0.25, 0.2,
0.15, and 0.05, respectively. Construct the minimum variance Huffman codes for this source.
Consider a memoryless discrete source with symbols a, b, and c with probabilities 0.4, 0.35, and 0.25,
respectively. Construct the 2nd order extended Huffman codes for this source.
Explain various attacks that can compromise the principal goals of cryptography.
Discuss different security mechanisms in cryptography.
What is the output of a 4-round Feistel network when the input is (LE0, RE0) and each round function
outputs all 1s, regardless of the input?
Explain the working of DES cryptosystem.
Illustrate and explain the working of 3DES cryptosystem.
Illustrate and explain the four operations performed in a single round of AES encryption.
Discuss the five block cipher modes for encrypting multiple plaintext blocks. Explain why CBC mode is
better than ECB mode.
Illustrate and briefly discuss the working of key distribution center (KDC) for the purpose of exchanging a
secret key between two users A and B.
Solve the linear congruence equation for x: 14x 12 mod 18
Solve the linear congruence equation for x: 232x + 42 248 mod 50
Find all multiplicative inverse pairs in Z20.
State Fermats theorem and thus compute 82015 mod 11.
Determine 7-1 mod 55 using Eulers theorem.
Using extended Euclid algorithm, determine two integers x and y for two numbers 65 and 40 such that
gcd(65, 40) = 65x + 40y.
Using extended Euclid algorithm, determine two integers x and y for two numbers 1124 and 84 such that
gcd(1124, 84) = 1124x + 84y.
Is it feasible to achieve both confidentiality and authentication using the concept of public key
cryptography? If so, how?
Determine (240).
Discuss the key generation steps of RSA algorithm performed by user A.
Using RSA algorithm, obtain encryption and decryption equations for secure communication between
users A and B in order to achieve both goals of confidentiality and authentication.
What are the various attacks in RSA cryptosystem?
Akshay and Bipasha decided to communicate using 3DES encryption system to preserve confidentiality.
To use a secret key K, they agreed to use Diffie-Hellman key exchange system. Illustrate how an attacker
Don will fool Akshay and Bipasha by giving them wrong keys K1 and K2.
Users Alka and Brijesh perform Diffie-Hellman key exchange using q = 53 and alpha = 2. If A chooses her
secret key = 10 and B chooses his secret key = 33, then compute the common shared secret key.
Explain the working of Public Key Authority for the purpose of obtaining public keys.
Define digital certificate. Illustrate and explain a) how Facebook Inc. will obtain its certificate from
Verisign Certificate Authority, and b) how your browser will verify this certificate when you visit
www.facebook.com
Describe the properties of hash functions and explain how hash can be used to verify message integrity.
Illustrate and explain the working of HMAC technique.

You might also like