Professional Documents
Culture Documents
Assignment Questions - IAS - TESTIII PDF
Assignment Questions - IAS - TESTIII PDF
Note: each question carries 10Marks, one question from each group will
be given in the Question paper
Group-I
1. Choose GF(23) with elements {0,1,g,g2,g3,g4,g5,g6} using the irreducible
polynomial of g(x)=g3+g+1 g3 is computed as g3=g+1. Similarly calculate
the values of the remaining elements. Justify why the above computation
is not required for g and g 2.(Behrouz A Forouzan,3edition Page Number
287)
2. Using the elliptic Curve y2+xy=x3+g3x2+1, with a=g3 and b=1, Justify the
below points lie on the elliptic curve. Use the irreducible polynomial
g(x)=g3+g+1. .(Behrouz A Forouzan,3edition, Page Number 287)
a. (g2,1)
b. (g3,g2)
c. (g5,g4)
3. Illustrate with a neat Sketch and explain in keen the step by step process
of Elliptic curve cryptography simulating Elgamal. .(Behrouz A
Forouzan,3edition, Page Number 288)
4. Find R= P+Q,
Where P= (0, 1), Q= (g2,1) and a=g3 and b=1 using irreducible polynomial
g(x)=g3+g+1.(Behrouz A Forouzan,3edition, Page Number 288)
5. Find R= P+Q
Where P=(3,10), Q=(9,7),P=23, a=1,b=1 .(Behrouz A Forouzan,3edition,
Page Number 286)
6. An Elliptic Curve E13(1,1), the equation is y2=x3+x+1 and the calculation
is done modulo 13.
Justify the following points lie on the elliptic curve or not. .(Behrouz A
Forouzan,3edition, Page number 286)
a. (1,4)
b. (8,1)
c. (11,12)
d. (10,6)
Group-II
RefernceBook :
Edition : 2
Publisher:McGrawHill
1.(a) In SHA-512, show the value of length field in hexadecimal if the message
length is 1000 bits (P.No:354)
(b)What is the padding for SHA-512 if the length of the message is 6143 bits
(P.No:355)
(c ) If the left most hexa decimal digits of buffers A,B and C are 0x7, 0xA and
0XE respectively. What is the output of the left most digit of Majority Function.
2.(a) In SHA-512, show the value of length field in hexadecimal if the message
length is 10000 bits (P.No:354)
(b)What is the padding for SHA-512 if the length of the message is 5121 bits
(P.No:355)
(c )) If the left most hexa decimal digits of buffers E,F and G are 0x9, 0xA and
0XF respectively. What is the output of the left most digit of Conditional
Function.
3.(a) In SHA-512, show the value of length field in hexadecimal if the message
length is 1000000 bits(P.No:354)
(b)What is the padding for SHA-512 if the length of the message is 5120 bits
(P.No:355)
(c ) Find the result of RotR12(x) if x= 1234 5678 ABCD 2345 34564 5678 ABCD
2468
4.(a) What is the minimum and maximum number of padding bits that can be
added to a message SHA-512.(P.No:347)
(c ) Find the result of ShL12(x) if x= 1234 5678 ABCD 2345 34564 5678 ABCD
2468(P.No:355)
5.(a) State and explain the security requirements for cryptographic hash
functions( cryptography network security-5th edition P.no335)
(b)Show that if two messages are the same, their last blocks are also the same
in case of SHA512.
Group -III
1. When a combination of symmetric encryption and an error control code
is used for message authentication, in what order must the two
functions be performed? (10Marks)
Page Nos:365 to 369 Text Book: cryptography and network security
principles and practice 5th edition-William Stallings