You are on page 1of 4

CRYPTOGAPHY & NETWORK SECURITY

2008-2009

1. Attempt any four parts:

(a) Define the three security goals. Distinguish between passive & active attacks with suitable examples.
(b) Distinguish between :
(i) Substitution Cipher & Transposition Cipher.
(ii) Stream Cipher & Block Cipher.
(c) A Small private club has only 100 members. Answer the following questions:
(i) How many secret keys are need if all the members of the club need to send secret messages to
each other.
(ii) How many secret keys are needed if everyone trusts the president of the club? If a member
needs to send a message to another member, she first sends it to the president & the president
sends this message to the other members.
(d) What is Shannon’s theory of confusion and diffusion? Which parameters and choices determine the
actual algorithm of fiestel cipher?
(e) How does meet-in-the-middle attack improve the vulnerability in double DES? What are the
advantages of implementing Triple DES with two keys?
(f) Explain why modes of operation are needed if modern block ciphers are to be used for
encipherment. Show why CFB mode creates a non synchronous stream cipher, but OFB mode
creates a synchronous one.

2. Attempt any four parts:

(a) Prove the following modular arithmetic properties:


(i) [( a mod n)-(b mod n)]mod n = (a-b)mod n
(ii) [(a mod n) x (b mod n)]mod n =(a x b)mod n
(b) Define the Chinese remainder theorem and its applications. Find the value of x for the following sets
of congruence using the Chinese Remainder Theorem :
(i) x ≡ 2 mod 7, and x ≡ 3 mod 9
(ii) x ≡ 4 mod 5, and x ≡10 mod 11
(c) Consider a plain text alphabet G. Using the RSA algorithm and the values as e=3, d=11 and n=15,
find out what this plain text alphabet encrypts to, and verify that upon decryption, it transforms back
to G.
(d) Discuss the idea of elliptic curve cryptography.
(e) Briefly explain the idea behind the EIGamal cryptosystem. Describe the security of this system.
(f) For the group Sn of al permutations of n distinct symbols,
(i) What is the number of elements in Sn ?
(ii) Show that Sn is not abelian for n>2.

3. Attempt any Two parts:

(a) (i) What is digital signature? Show how RSA can be used for performing digital Signature.
(ii) Define any two birthday problems. Associate each birthday problem with one of the attacks
on Hash Function.
(b) (i) Compare and contrast symmetric and asymmetric key cryptography. How the best can be taken
from both the combined to give a better solution?
(ii) Discuss how different steps of SHA produce a message digest.

(c) Discuss mutual authentication and one-way authentication protocols. How do they deal with the
replay attacks?

4. Attempt any Two parts:

(a) What are the typical contents in X.509 certificate format? State the purpose of different fields of
certificate revocation list (CRL). What is the delta revocation?

(b) Why do we need the Kerberos authentication protocol? Discuss the roles of authentication server,
ticket-granting server and the real server. State the interaction of client with the different servers to get
the service of real server.

(c) What is the purpose of S/MIME? Discuss functionality of S/MIME.

5. Attempt any Two parts:

(a) State the purpose of each field of authentication header and encapsulating security payload protocols
of IPSec. Discuss the idea of security association.
(b) Why is the SSL layer positioned between the application layer and the Transport layer? Discuss the
following sub-protocols of SSL:
(i) Handshake protocol.
(ii) Record protocol.
(iii) Alert protocol.
(c) What is a firewall? Discuss its different types and the possible configurations.
CRYPTOGAPHY & NETWORK SECURITY
2009-2010

1. Attempt any four parts :


(a) What is mono-alphabetic cipher? How is it different from Caesar cipher?
(b) Explain the principle of differential cryptanalysis. Describe active and passive security attacks.
(c) What is the transposition cipher? Illustrate with an example.
(d) What is double DES? Explain the term MEET in the middle attack.
(e) What do you understand by Feistel Cipher structure? Explain with example.
(f) A Hill Cipher uses the following key for the enciphering the message :

3 2
K=
5 7
Obtain the decryption key to be used for deciphering the cipher text.

2. Attempt any two parts:

(a) Describe in brief IDEA encryption and decryption. Also explain how can we generate
cryptographically secure pseudorandom numbers?
(b) Explain the following :
(i) MAC (Message Authentication Code)
(ii) HMAC (Hash based Message Authentication Code)
(c) Explain the Blowfish cryptographic algorithm. Also differentiate between differential and linear
cryptoanalysis.

3. Attempt any Two parts:

(a) Why the middle portion of the Triple DES is used in a decryption rather than encryption?
Discuss the strength of DES algorithm and also explain the substitution method including the P-
Box?
(b) Explain the Euler’s Coefficient function. State and prove Fermat’s Theorem.
(c) Explain RSA algorithm. Perform encryption and decryption using RSA algorithm for p = 17,
q =11, e = 7, M = 88.

4. Attempt any Two parts:

(a) Explain the Pretty God Privacy (PGP) algorithm. List various services supported by PGP.
(b) Given that the First 16 bits of the 128 bit message digest in a PGP signature are translated in the
clear. Explain to what extent this compromises the security of the hash algorithm.
(c) What do you understand by Elgamel encryption system? Explain its encryption and decryption?
What do you understand by Digital Signatures?
5. Attempt any two parts:

(a) What is Kerberos? Discuss Kerberos version 4 in detail. What is S/MIME and its main
functions?
(b) What are typical phases of an operation of a virus or worm and how does the behaviour blocking
S/W work?
(c) Give the format of X.509 certificate showing the important element of the certificate. Explain
the format.

You might also like