Cst433 Security in Computing, December 2022
Cst433 Security in Computing, December 2022
Reg No.:
PART A
Answer all questions, each carries 3 marks.
I lllustrate the two approaches to attack a conventional encryption scheme. (3)
2 Use an Affine cipher to encrypt the message 'its cool' with the key pair(5,8) in (3)
modulus 26.
3 Differentiate block cipher and stream cipher. (3)
4 Explain Triple DES encryption with two keys and three keys. (3)
5 Compare symmetric and asymmetric cryptosystems. (3)
6 Illustrate man in the middle attack on Diffie Hellman key exchange algorithm. (3)
7 List any three applications of cryptographic hash function. (3)
8 How digital signature is implemented using the RSA approach? (3)
9 What are the three classes of intruders? (3)
l0 Explain different techniques used to avoid guessable passwords. (3)
PART B
Answer any onefull questionfrom each module, each carries 14 marks.
1l a) List and explain the categories of passive attack and active attack. (7)
t b) Explain Vigenere cipher. Using Vigenere cipher encrypts the word 'CYBER (7)
Page 1of2
b) List out the block cipher modes of operations. Describe any two block cipher (5)
modes of operation{
Module lll
15 a) Explain RSA algorithm. In a RSA cryptosystem a user A uses two prime (8)
numbers p : l3 and q=17 to generate her public and private keys. If the public
key of Ais 35. Find the private key of A.
b) Demonstrate Diffie Hellman Key exchange algorithm. (6)
OR
A chooses the random number k=2, what is the cipher text of the message
M:30?
b) Explain the key exchange procedure using Elliptic Curves cryptography. (5)
Module lV
17 a) Illustrate the working of SHA-512 algorithm with diagrams. (9)
OR
Module V
19 a) distribution.
Describe the different techniques for public key (8)
OR
b) Explain different types of Simple Dffi afiack and its countermeasures. (6)
Page2of2