Professional Documents
Culture Documents
INSTRUCTIONS TO CANDIDATES
Candidates are NOT ALLOWED to bring any unauthorized items into the exam hall
except with the permission of your invigilator.
CONFIDENTIAL
FCSIT/INS2313/JAN15
3. Why block ciphers are commonly used by cryptographer compare than stream
cipher?
4. Identify two principles to build a strong block cipher proposed by Shannon (1949).
A. 13
B. 14
C. 15
D. 16
CONFIDENTIAL /2
FCSIT/INS2313/JAN15
A. SubBytes.
B. MixColumns.
C. ShiftColumns.
D. AddRoundKeys.
A. SAFER.
B. SHARK.
C. Rijndael.
D. Camellia.
9. Which of the following algorithm is used for key transport and digital signatures?
A. ECC.
B. RSA.
C. CRT.
D. DKHE.
A. Find a collision.
B. Message overhead.
C. Preimage resistance.
D. Computes a 32-bit word.
11. Which of the following answers in NOT the principles of digital signature?
CONFIDENTIAL /3
FCSIT/INS2313/JAN15
13. Which of the following answers are two important issues are addressed with
public-key cryptography?
14. What are the input bits for message processing of SHA-256?
A. 512 bits.
B. 256 bits.
C. 128 bits.
D. 1024 bits.
CONFIDENTIAL /4
FCSIT/INS2313/JAN15
Question 1
Interpret the secret message produced from the message “MEET YOU IN THE
PARK” using the Caesar Cipher?
(5 marks)
Question 2
Question 3
Question 4
Identify the number of rounds and the number of round keys in Table 1.
Table 1
Version Number of rounds Number of round keys
AES-128 (i) (ii)
AES-192 (iii) (iv)
AES-256 14 (v)
(5 marks)
Question 5
Question 6
Compute A(x) ·B(x) mod P(x) in GF(24) using the irreducible polynomial.
P(x) =x4+x+1, A(x) = x2+1, B(x) = x3+x2+1
(6 marks)
CONFIDENTIAL /5
FCSIT/INS2313/JAN15
Question 7
Compute the greatest common divisor by using the basic form of Euclid’s
algorithm.
Question 8
Question 9
Encrypt the message HELP using the RSA system with n=43.59 and e=13,
translating each letter into integers.
(6 marks)
Question 10
Table 2: S-box
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 15 01 08 14 06 11 03 04 09 07 02 13 12 00 05 10
1 03 13 04 07 15 02 08 14 12 00 01 10 06 09 11 05
2 00 14 07 11 10 04 13 01 05 08 12 06 09 03 02 15
3 13 08 10 01 03 15 04 02 11 06 07 12 00 05 14 09
CONFIDENTIAL /6
FCSIT/INS2313/JAN15
Question 1
Question 2
a) Develop a simple protocol using RSA, which allows the two parties Alice
and Bob to agree on a shared secret key.
(8 marks)
b) Explain the person who determines the key in this protocol
(2 marks)
CONFIDENTIAL /7
FCSIT/INS2313/JAN15
Question 3
Assume the situation where Oscar eavesdrops on the following two messages that were
previously signed with Bob’s private key and that use the same ephemeral key kE:
CONFIDENTIAL /8