Gujarat Technological University
Gujarat Technological University
Gujarat Technological University
___________
(c) Explain playfair cipher. Encrypt the plain-text message “helloe jassmin” using 07
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any
‘j’ in the plaintext is replaced by ‘i’.)
Q.2 (a) Discuss Electronic Code Book mode and Counter mode in detail. 03
(b) Write difference between Block vs Stream Ciphers. Explain following terms 04
in context of cryptography: confusion and diffusion
(c) Explain DES round structure in detail. 07
OR
(c) Write a note on Advanced Encryption Standard(AES). 07
Q.3 (a) Write difference between conventional encryption and public-key encryption 03
(b) Explain man-in-the middle attack on Diffie-Hellman key exchange. 04
(c) Explain RSA algorithm in detail. Perform encryption and decryption using 07
RSA algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
OR
Q.3 (a) Explain following terms: Avalanche Effect, Cryptanalysis 03
(b) Discuss possible approaches to attack RSA. 04
(c) Explain the Deffie Hellman key exchange scheme in detail. In a Diffie- 07
Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and
primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is
the secret key they exchanged?
Q.4 Compare and contrast – MAC VS Encryption functions. In MAC, if 80-bit key
(a) 03
is used and the tag is 32 bits, then after how many rounds attacker will produce
a key, which must be the one used by the sender ?
(b) Explain working of Cipher-based Message Authentication Code and Data 04
Authentication Algorithm.
(c) Explain the working of Secure Hash Algorithm-512 in detail. 07
OR
Q.4 (a) Discuss three applications of hash functions. 03
1
(b) Discuss Hash function and its requirements. 04
(c) Write the algorithm for message authentication code based on HASH 07
functions. Also discuss its efficient implementation approach.
Q.5 Draw X.509 certificate format. Enlist the reasons to revoke the certificate
(a) 03
before expiry.
(b) Explain different ways to distribute symmetric key using symmetric and 04
asymmetric encryptions.
(c) Enlist requirements of Kerberos. Enlist and explain roles of various servers are 07
used in Kerberos. Explain through diagram, how Kerberos can communication
with other administrative domains for providing trusted services to the clients.
OR
Q.5 (a) Explain briefly: Linear and Differential Cryptanalysis 03
(b) Explain various general categories of schemes for the distribution of public 04
keys.
(c) Define Digital signature. Explain digital signature algorithm. 07
*************