Professional Documents
Culture Documents
March2006 Network Security and Cryptography
March2006 Network Security and Cryptography
in
.in
(d) Steganography [4M]
.co
(b) What are the differences between RC5 and RC2? [8M]
ii. If user B has public key YB = 3, what is the shared key K? [10M]
se
4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
the following congruences:
pu
1 of 2
http://www.campusexpress.co.in
campusexpress.co.in
⋆⋆⋆⋆⋆
.in
.co
ss
re
xp
se
pu
m
ca
2 of 2
http://www.campusexpress.co.in
campusexpress.co.in
.in
3. (a) Explain the process encryption and decryption in Elliptic curve cryptography?
[8M]
.co
(b) Explain the additive rules of Elliptic Curve Cryptography? [8M]
4. (a) Explain Chinese Remainder Theorem.
(b) State and prove Euler’s theorem?
(c) Using Fermat’s theorem, find 201 mod 11.
ss [5M+5M+6M]
re
5. (a) What is a message authentication code?
xp
(b) What is difference between message authentication code and a one-way hash
function?
se
(c) In what ways can a hash value be secured so as to provide message authenti-
cation?
pu
[5+5+6]
m
⋆⋆⋆⋆⋆
1 of 1
http://www.campusexpress.co.in
campusexpress.co.in
1. (a) What are the various components of symmetric cipher model? Explain. [8M]
(b) Write short notes on crypto analysis. [8M]
.in
3. (a) What is a one-way function?
(b) What is trap-door one-way function?
.co
(c) Describe in general terms an efficient procedure for picking a prime number?
[5+5+6]
ss
4. Given 2 as a primitive root of 29, construct a table of indices, and use it to solve
re
the following congruences:
xp
5. (a) What is the difference between weak and strong collision resistance?
(b) What is the role of a compression function in a hash function? [6+10]
m
7. (a) List and briefly define the parameters that define an SSL session state?
(b) List and briefly define the parameters that define an SSL session connection?
[8+8]
⋆⋆⋆⋆⋆
1 of 1
http://www.campusexpress.co.in
campusexpress.co.in
1. (a) What are differences between a block cipher and a stream cipher? [8M]
(b) Explain various modes of operations of block ciphers. [8M]
.in
3. (a) Consider the Elliptic curve E11 (1,6) that is , the curve is defined by y 2 =
x3 + x + 6 with a modulus of P=11.Determine all of the points in E11(1,6)
.co
[8M]
(b) For E11(1,6) , consider the point G=(2,7) Compute the multiples of G from
2G through 4G ss [8M]
re
4. (a) Explain in detail about Extended Euclid’s Algorithm.
(b) Using above algorithm find the multiplicative Inverse of 1234 mod 4321. [8+8]
xp
(b) What basic arithmetical and logical functions are used in SHA-1? [6+10]
pu
(c) Why is the segmentation and reassembly function in PGP needed? [4+6+6]
ca
8. Write notes on
⋆⋆⋆⋆⋆
1 of 1
http://www.campusexpress.co.in