Professional Documents
Culture Documents
CNS MTE QB Solutions
CNS MTE QB Solutions
CNS MTE QB Solutions
Modification:-
An interceptor modifies information to benefit itself after accessing it, such as altering a
customer's transaction type after sending a message to a bank. This can be a significant
security risk.
Masquerading:-
Masquerading, or spoofing, is an attack where an attacker impersonates another to access a
system or gain more privileges than they are authorized for. For instance, an attacker might
steal a bank customer's card and PIN and pretend to be the customer. Alternatively, the attacker
might pretend to be the receiver entity, obtaining information from a user who tries to contact a
bank.
Replaying:-
It is an attack in which a service already authorized and completed is forged by another
“duplicate request” in an attempt to repeat authorized commands. For example, a person sends
a request to her bank for payment to the attacker, who has done a job for her. The attacker
intercepts the message and sends it again to receive another payment from the bank.
Repudiation:-
This type of attack is different from others because it is performed by one of the two parties in
communication: the sender or the receiver. The sender of the message might later deny that he
has sent the message; the receiver of the message might later deny that he has received the
message.
Passive attacks:-
A Passive attack attempts to learn or make use of information from the system but does not
affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring
transmission. The goal of the opponent is to obtain information that is being transmitted.
Passive attacks involve an attacker passively monitoring or collecting data without altering or
destroying it.
Operations:
● Authentication: Verifies the identity of users or systems before granting access.
● Authorization: Defines access privileges after successful authentication.
● Encryption: Converts data into a secure format to prevent unauthorized access.
● Integrity: Ensures data remains unaltered during transmission or storage.
● Non-Repudiation: Prevents individuals from denying actions they performed.
● Monitoring: Constantly observes network activities for security threats.
● Intrusion Detection: Identifies and responds to unauthorized access attempts.
● Firewall Protection: Monitors and controls incoming and outgoing network traffic.
Requirements:
● Confidentiality: Ensures only authorized parties can access sensitive information.
● Integrity: Guarantees data accuracy and prevents unauthorized tampering.
● Availability: Ensures systems and data are accessible when needed.
● Authentication: Confirms the identity of users and devices.
● Non-Repudiation: Prevents denial of actions performed by a user.
● Resilience: Ability to withstand and recover from attacks or failures.
Components:
● Firewalls: Monitor and control incoming/outgoing network traffic as a barrier between
trusted and untrusted networks.
● Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Detect and
respond to unauthorized access or attacks in real time.
● Virtual Private Networks (VPNs): Securely connect remote users or networks over the
internet using encryption.
● Antivirus Software: Detects, prevents, and removes malicious software (malware) from
computer systems.
● Authentication Protocols: Examples include username/password, tokens, biometrics,
and multi-factor authentication.
Give the types of attacks with examples.
Depending on the type of cryptographic system in place and the information available to the
attacker, these attacks can be broadly classified into six types:
● Brute force attack:- Cryptographic systems rely on public and private keys, with
cybercriminals using 256 possible private keys in brute-force attacks. To succeed, they
must know the algorithm to attempt all 256 possible keys, typically found in open-source
programs.
● Ciphertext-only attack:- The attacker gains access to a collection of ciphertext, unable to
access plaintext, but can determine the ciphertext from it, occasionally determining the
key through this attack technique.
● Chosen plaintext attack:- In this attack model, the cybercriminal can choose arbitrary
plaintext data to obtain the ciphertext. It simplifies the attacker's task of resolving the
encryption key. One well-known example of this type of attack is the differential
cryptanalysis performed on block ciphers.
● Chosen ciphertext attack:- The cybercriminal analyzes a ciphertext corresponding to its
plaintext to obtain a secret key or system details. They relate the ciphertext to the
plaintext, attempting to guess the key and older RSA encryption versions were
susceptible to this attack.
● Known plaintext attack:- In this attack technique, the cybercriminal finds or knows the
plaintext of some portions of the ciphertext using information-gathering techniques.
Linear cryptanalysis in block cipher is one such example.
● Key and algorithm attack:- Here, the attacker tries to recover the key used to encrypt or
decrypt the data by analyzing the cryptographic algorithm.
Examples:-
● Brute Force Attack: Trying all possible combinations of characters to crack a password,
such as attempting all alphanumeric combinations (e.g., a1B$).
● Ciphertext Only Attack: Analyzing only the encrypted messages without any knowledge
of the corresponding plaintext or the encryption method used.
● Chosen Plaintext Attack: Attacker can choose specific plaintexts and obtain their
corresponding ciphertexts, helping deduce the encryption key (e.g., encrypting chosen
words like "HELLO" to study resulting ciphertext).
● Chosen Ciphertext Attack: Attacker can choose specific ciphertexts and obtain their
corresponding plaintexts, often used to decrypt other ciphertexts encrypted with the
same key (e.g., manipulating ciphertexts to reveal secret information).
● Known Plaintext Attack: Attacker knows some parts of the plaintext and their
corresponding ciphertext, using this information to deduce the encryption key or decrypt
other messages (e.g., knowing a specific phrase in both plaintext and ciphertext).
● Key and Algorithm Attack: Attacker tries to deduce the encryption key and the encryption
algorithm used by analyzing the encrypted messages, aiming to decrypt other messages
encrypted with the same key and algorithm.
Define threat and attack.
Threat:-
A Threat is a possible security risk that might exploit the vulnerability of a system or asset. The
origin of the threat may be accidental or environmental, human negligence, or human failure.
There are various security threats, such as Interruption, Interception, Fabrication, and
Modification.
Threats can be divided into three categories −
Attack:-
An Attack is an intentional, unauthorized action on a system. Attacks can be grouped into two
categories −
● Active Attacks − An active attack attempts to change system resources or influence their
operation.
● Passive Attacks − A passive attack attempts to understand or retrieve sensitive data
from a system without influencing the system resources.
An attack always has a motivation to misuse the system and generally wait for an opportunity to
occur.
Authentication:-
The authentication service ensures the authenticity of a communication, ensuring that it is from
the source it claims to be from. Single messages like warnings or alarm signals must be
authentic. For ongoing interactions like connecting a terminal to a host, the service must ensure
that the two entities are authentic at the connection initiation and that the connection is not
interfered with, preventing unauthorized transmission or reception by a third party masquerading
as one of the legitimate parties.
Access control:-
Access control in network security involves limiting and controlling access to host systems and
applications through communications links. It requires each entity to be authenticated to tailor
access rights to individual needs.
Data Confidentiality:-
Confidentiality safeguards data from passive attacks, with various levels of protection. The
broadest service safeguards all user data transmitted over time, like in a TCP connection
between two systems, preventing data release. This protection is crucial for maintaining security
and privacy in data transmission.
Data Integrity:-
Integrity in communication can be applied to various aspects, including messages, streams, or
selected fields. Total stream protection is the most effective approach, while connection-oriented
integrity services ensure messages are received as sent without duplication, insertion,
modification, reordering, or replays. Connectionless integrity services protect against message
modification. Service with and without recovery are distinct, focusing on detection rather than
prevention. Automated recovery mechanisms are generally more attractive as they can recover
from data loss. Further review will explore these mechanisms.
Nonrepudiation:-
Nonrepudiation allows both sender and receiver to deny a transmitted message, allowing the
receiver to prove the sender sent the message and the sender to prove the receiver received
the message.
NOTE:-
● Avoid very small block size − A block size of m bits allows for 2m possible plaintext bits
combinations. If an attacker discovers plain text blocks corresponding to ciphertext
blocks, they can launch a dictionary attack by building a dictionary of plaintext/ciphertext
pairs. A larger block size makes the attack harder.
● Do not have very large block size − With very large block size, the cipher becomes
inefficient to operate. Such plaintexts will need to be padded before being encrypted.
● Multiples of 8 bit − A preferred block size is a multiple of 8 as it is easy for
implementation as most computer processor handle data in multiple of 8 bits.
Transposition Techniques:-
● Rail Fence Transposition
● Columnar Transposition
● Improved Columnar Transposition
● Book Cipher/Running Key Cipher
Now, we will write this plain text sequence wise in a diagonal form as you can see below:
Looking at the image, you would get it why it got named rail fence because it appears like the
rail fence.
Once you have written the message as a sequence of diagonals, to obtain the cipher text out of
it you have to read it as a sequence of rows. So, reading the first row the first half of cipher text
will be:
memtmro
reading the second row of the rail fence, we will get the second half of the cipher text:
eteoorw
Now, to obtain the complete cipher text combine both the halves of cipher text and the complete
cipher text will be:
Cipher Text: M E M T M R O E T E O O R W
Columnar Transpoistion:-
The columnar transposition cipher is more complex as compared to the rail fence. The steps to
obtain cipher text using this technique are as follow:
● Step 1: The plain text is written in the rectangular matrix of the initially defined size in a
row by row pattern.
● Step 2: To obtain the cipher text read the text written in a rectangular matrix column by
column. But you have to permute the order of column before reading it column by
column. The obtained message is the cipher text message.
Now, put the plain text in the rectangle of a predefined size. For our example, the predefined
size of the rectangle would be 3×4. As you can see in the image below the plain text is placed in
the rectangle of 3×4. And we have also permuted the order of the column.
Cipher Text: MTREOREMOTOW.
Let us discuss one example of a columnar transposition technique for better understanding. We
will consider the same example of a basic columnar technique which will help in understanding
the complexity of the method:
Let us put this plain text in the rectangle of predefined size of 3×4. Proceeding with the next
step, the order of the columns of the matrix is permuted as you can see in the image below:
Now after the first round the cipher text obtained is as follow:
Now, again we have to put the cipher text of round 1 in the rectangle of size 3×4 row by row and
permute the order of columns before reading the cipher text for round 2. In the second round,
the permuted order of the column is 2, 3, 1, 4.
So, the obtained cipher text for round 2 is MOOTRTREOEMW. In this way, we can perform as
many iterations as requires.
Matrix Formation:
● Create a 5x5 matrix using the letters from the key (in order):
L|A|R|G|E
-------------------
S|T|B|C|D
-------------------
F|H|I|K|M
-------------------
N|O|P|Q|U
-------------------
V|W|X|Y|Z
Message Preparation:
● Remove spaces and make pairs of letters: "ME ET ME AT TH ET OG AP AR TY."
● Add a filler letter (e.g., "X") between repeated or trailing letters: "MEXE TXME ATTH ET
OGAP AR TY."
Encryption:
● Encrypt each letter pair using the Playfair matrix:
○ "ME" becomes "OM" (M to O, E to M).
○ "XE" becomes "XM" (X to X, E to M).
○ "TX" becomes "ER" (T to E, X to R).
○ "ME" becomes "OM" (M to O, E to M).
○ "AT" becomes "CO" (A to C, T to O).
○ "TH" becomes "AF" (T to A, H to F).
○ "ET" becomes "XM" (E to X, T to M).
○ "OG" becomes "BK" (O to B, G to K).
○ "AP" becomes "MP" (A to M, P to P).
○ "AR" becomes "GM" (A to G, R to M).
○ "TY" becomes "RN" (T to R, Y to N).
Explain the Play Fair cipher algorithm? Encrypt the message ‘MY
BALLOON’ using the key ‘MONACHRY’
Playfair Cipher:-
The Playfair cipher, invented in 1854 by Charles Wheatstone, was the first practical digraph
substitution cipher. Named after Lord Playfair, it encrypts a pair of digraphs instead of a single
alphabet. During the Second Boer War, World War I, and World War II, it was used for tactical
purposes by British forces and Australians due to its speed and lack of special equipment.
Key Preparation:
● Remove duplicate letters: "MONACHRY" (remove duplicates: "MONACHRY").
● Fill the remaining letters of the alphabet in order, omitting duplicates and "J" (which is
typically replaced with "I"): "MONACHRYBDEFGIKLPQSTUVWXZ."
Matrix Formation:
● Create a 5x5 matrix using the letters from the key (in order):
M|O|N|A|C
-------------------
H|R|Y|B|D
-------------------
E|F|G|I|K
-------------------
L|P|Q|S|T
-------------------
U|V|W|X|Z
Message Preparation:
● Convert the message to uppercase: "MY BALLOON."
● Remove spaces: "MYBALLOON."
● Add a filler letter (e.g., "X") between repeated or trailing letters: "MYBALLOONX."
Letter Pairs:
● Create pairs of letters: "MY", "BA", "LL", "OO", "NX."
Encryption:
● Encrypt each letter pair using the Playfair matrix:
○ "MY" becomes "CL" (M to C, Y to L).
○ "BA" becomes "RY" (B to R, A to Y).
○ "LL" becomes "IS" (L to I, L to S).
○ "OO" becomes "RM" (O to R, O to M).
○ "NX" becomes "VB" (N to V, X to B).
Caesar Cipher:
● Description: Shifts each letter in the plaintext by a fixed number of positions down the
alphabet.
● Example: Using a shift of 3, "HELLO" becomes "KHOOR."
Playfair Cipher:
● Description: Encrypts digraphs (pairs of letters) using a 5x5 matrix of letters, with specific
rules to handle different cases (e.g., same row/column, same letter in pair).
● Example: With the key "KEYWORD," and encrypting "HELLO," it becomes "IFMMP."
Vigenère Cipher:
● Description: Uses a keyword to shift letters in the plaintext, with each letter of the
keyword representing a different shift value.
● Example: With the keyword "KEY," and encrypting "HELLO," it becomes "RIJVS."
Affine Cipher:
● Description: Combines multiplication and addition transformations on each letter's
numerical representation, using modular arithmetic.
● Example: With the equation E(x)=(ax+b) mod26 , and using a=5 and b=8 ,
"HELLO" becomes "DPRRU."
Use Caesar cipher with key =15 to encrypt the message “Hello”.
● Original Message: Hello
● Convert letters to numbers (A=0, B=1, ..., Z=25):
H -> 7
E -> 4
L -> 11
L -> 11
O -> 14
● Add the key (15) to each number:
H -> (7 + 15) % 26 = 22 -> W
E -> (4 + 15) % 26 = 19 -> T
L -> (11 + 15) % 26 = 0 -> A
L -> (11 + 15) % 26 = 0 -> A
O -> (14 + 15) % 26 = 3 -> D
● Convert numbers back to letters:
22 -> W
19 -> T
0 -> A
0 -> A
3 -> D
● Encrypted Message: WTAAD
Keyword: HEALTH
Convert letters in the message and the repeated keyword to numbers (A=0, B=1, ..., Z=25):
L -> 11, E -> 4, T -> 19, C -> 2, etc.
Repeated Keyword: 7, 4, 0, 11, 19, 7, 4, 0, 11, 19, 7, 4, 0, 11, 19, 7, 4, 0, 11, 19
Pattern Recognition:
● Caesar Cipher Weakness: In Caesar cipher, if a pattern like "THE" appears in the
plaintext, the same pattern appears in the ciphertext.
● Monoalphabetic Ciphers: By using diverse substitution patterns, monoalphabetic ciphers
eliminate recognizable patterns, enhancing security.
Polyalphabetic Nature:
● Monoalphabetic Ciphers: They introduce a polyalphabetic nature, meaning that different
letters can be encrypted to different ciphertext letters based on their positions in the
plaintext, increasing complexity and security.
Compare Vegenere and Vernam cipher in terms of security.
Encrypt the message “attack postponed until next instruction”
using Rail fence technique with height 3.
Encrypt the plaintext message “Cryptanalysis is very interesting.
Breaking the codes is art and science” using 9 row matrix and key
as 4,3,1,2,5,6,7.
Unit 2
Compare stream ciphers and block ciphers.
Substitution of the bytes:- In the first step, the bytes of the block text are substituted based on
rules dictated by predefined S-boxes (short for substitution boxes).
Shifting the rows:- Next comes the permutation step. In this step, all rows except the first are
shifted by one, as shown below.
Mixing the columns:- In the third step, the Hill cipher is used to jumble up the message more by
mixing the block’s columns.
Adding the round key:- In the final step, the message is XORed with the respective round key.
When done repeatedly, these steps ensure that the final ciphertext is secure.
Explain permutation and substitution steps in DES algorithm.
Permutation Step (Initial Permutation and Final Permutation):
S-Box Characteristics:
● S-boxes ensure that a small change in input results in a significantly different output.
● Designed to be resistant against differential and linear cryptanalysis.
● The substitution process adds a high degree of confusion and diffusion, crucial for
cryptographic strength.
Key Generation:
● The 64-bit key is transformed into sixteen 48-bit round keys using the key schedule,
which involves permutation and shifting operations.
● Each round key is specific to the current round.
Expansion (E-Box):
● The right half of the 64-bit permuted block (32 bits) is expanded to 48 bits using an
expansion permutation.
● This expansion increases the complexity and ensures that each bit in the output
depends on multiple bits from the input.
Substitution (S-Boxes):
● The 48-bit result from the XOR operation is divided into eight 6-bit blocks.
● Each 6-bit block is substituted using eight S-boxes (substitution boxes), each providing a
4-bit output.
● The S-boxes introduce non-linearity into the encryption process, enhancing the
algorithm's resistance against cryptanalysis.
Permutation (P-Box):
● The 32-bit output from the S-boxes is then subjected to a fixed permutation known as
the P-box permutation.
● This permutation reorganizes the bits before they are combined with the left half of the
input block.
End of Round:
● The output from this single round serves as input for the next round in a multiple-round
DES encryption.
● For the final round, the left and right halves are not swapped.
SubBytes Transformation:
● Operation: SubBytes operate on each byte independently.
● Change in Contents: SubBytes substitute each byte with a corresponding byte from the
S-Box, introducing a substitution that changes the contents of bytes.
ShiftRows Transformation:
● Operation: ShiftRows operates on the rows of the state (a 4x4 matrix of bytes).
● Change in Contents: Bytes in each row are shifted cyclically, changing the order of bytes
within each row. This changes the contents of bytes within rows.
MixColumns Transformation:
● Operation: MixColumns operates on the columns of the state.
● Change in Contents: Bytes in each column are transformed using a mathematical
function, introducing mixing and diffusion. This transformation changes the contents of
bytes within columns.
AddRoundKey Transformation:
● Operation: AddRoundKey XORs each byte of the state with a corresponding byte from
the round key.
● Change in Contents: XOR operation changes the contents of bytes based on the round
key, adding a layer of key-dependent permutation to the data.
Key Expansion:
● Operation: Key Expansion generates round keys from the original key.
● Change in Contents: Key Expansion involves various permutations and substitutions to
create round keys, but it doesn’t directly modify the contents of individual bytes in the
original key.
Disadvantages:-
● The 56-bit key size is the biggest defect of DES. Chips to perform one million of DES
encrypt or decrypt operations a second are available (in 1993). A $1 million DES
cracking machine can search the entire key space in about 7 hours.
● Hardware implementations of DES are very fast; DES was not designed for software and
hence runs relatively slowly.
● As the technology is improving lot more day by day so there is a possibility to break the
encrypted code, so AES is preferred than DES.
● As we know in DES only one private key is used for encryption as well as for decryption
because it is symmetric encryption technique so if we lost that key to decrypt the data
then we cannot get the readable data at the receiving end.
● Non-linearity:- S-Boxes introduce non-linearity into the DES algorithm, which enhances
the resistance against linear and differential cryptanalysis.
● Confusion:- They create confusion by substituting 6 bits of data with 4 bits, making it
difficult to discern the relationship between the input and output.
● Increased Security:- S-Boxes significantly increase the complexity of the algorithm,
making brute-force attacks more computationally intensive due to the large number of
possible substitutions.
● Diffusion:- Through substitution, S-Boxes contribute to the diffusion of bits throughout the
encryption process, spreading the influence of each input bit across multiple output bits.
● Resist Cryptanalysis:- Designed to resist known cryptographic attacks, including linear
and differential cryptanalysis, by ensuring that changes in a single bit of input result in
multiple bits changing in the output.
Input Transformation:
● Each S-Box takes a 6-bit input and transforms it into a 4-bit output. There are 8 S-Boxes
in DES.
Substitution:
● The selected row and column in the S-Box correspond to a unique 4-bit value.
● This 4-bit value is the substitution for the original 6-bit input.
Independent S-Boxes:
● Each S-Box operates independently of the others, meaning the input to one S-Box does
not affect the output of any other S-Box.
Final Output:
● The 32 output bits from all eight S-Boxes are combined to form the output of the
substitution permutation network (SPN) in the DES algorithm.
Explain key generation in DES algorithm with a suitable diagram.
● The round key generator produce sixteen 48-bit keys out of a 56-bit cipher key. The
cipher key is provided as 64 bit key in which 8 extra bits are parity bits, which are
discarded before the actual key generation process begins.
● The parity bit drop process drops the parity bits (bit 8, 16, 24, 32…64) from the 64-bit
key and permutes the remaining bit according to the pre-defined rules as display in the
parity bit drop table below.
● These remaining 56 bits are generally used for key generation.
● After the permutation, the keys are divided into two 28 bits parts. Each part is changed
left one or two bits is depend on the rounds.
● In round 1, 2, 9, and 16 shifting is one bit and in the other rounds it is two bits. The two
parts are integrated to build a 56 bit part.
● Thus the compression D-box transform it into 48 bit. These 48 bits are being utilized as a
key for a round.
1. SubBytes Transformation:
● Operation: SubBytes operates on each byte independently.
● Explanation: Each byte in the state matrix is replaced with a corresponding byte from the
S-Box substitution table. This substitution provides non-linearity and confusion,
enhancing security by ensuring that different bytes are substituted differently.
2. ShiftRows Transformation:
● Operation: ShiftRows operates on the rows of the state (a 4x4 matrix of bytes).
● Explanation: Bytes in each row are shifted cyclically. The first row is not shifted, the
second row is shifted one position to the left, the third row is shifted two positions to the
left, and the fourth row is shifted three positions to the left. This diffusion ensures that
different bytes are distributed across rows, preventing patterns from forming.
3. MixColumns Transformation:
● Operation: MixColumns operates on the columns of the state.
● Explanation: Bytes in each column are combined using a mathematical function. This
mixing operation adds further diffusion, ensuring that the output bits depend on multiple
input bits. It provides a high degree of confusion and complexity to the encryption
process.
4. AddRoundKey Transformation:
● Operation: AddRoundKey XORs each byte of the state with a corresponding byte from
the round key.
● Explanation: Each byte in the state is combined with a byte from the round key using the
XOR operation. This step introduces the key into the encryption process, making the
output dependent on the secret key. The round key is derived from the original
encryption key but varies for each round, adding another layer of confusion and security.
The key expansion algorithm can be divided into four main steps: key schedule, byte
substitution, row shifting, and column mixing.
Key Schedule:-
● The first step in the key expansion algorithm is to create the key schedule. This involves
dividing the 128-bit key into four 32-bit words. These words are then used to generate
additional 32-bit words to create the round keys.
● The key schedule is created by performing a series of operations on the original key and
the previously generated words. These operations include XOR, substitution using the
S-box, and a round constant XOR operation.
Byte Substitution:-
The next step in the key expansion algorithm is to apply byte substitution using the S-box. The
S-box is a pre-defined table that replaces each byte of the input with a corresponding byte. This
substitution is non-linear and provides additional security to the encryption process.
Row Shifting:-
The third step in the key expansion algorithm is to perform row shifting. This involves shifting the
rows of the key schedule by a fixed number of bytes. The number of bytes shifted depends on
the round number, and it is different for each round.
Column Mixing:-
The final step in the key expansion algorithm is to perform column mixing. This involves
performing a series of operations on the columns of the key schedule. These operations include
multiplication by a fixed polynomial and XOR with other columns.
Once all four steps are complete, the key expansion algorithm has generated 11 round keys,
each consisting of 16 bytes (128 bits).
These round keys are used in the encryption and decryption process.
What are the different modes of operation in DES?
Experts using DES have five different modes of operation to choose from.
ShiftRows:
● Operation: Shifts the rows of the state matrix by different offsets.
● Purpose: Diffuses the bytes within rows, ensuring that the bytes from different blocks are
mixed, enhancing security.
MixColumns:
● Operation: Mixes the columns of the state matrix using a mathematical transformation.
● Purpose: Provides diffusion by combining bytes in each column, ensuring that each
output byte depends on multiple input bytes, increasing complexity.
AddRoundKey:
● Operation: XORs each byte of the state matrix with a corresponding byte from the round
key.
● Purpose: Adds a layer of key-dependent permutation, ensuring that the output depends
not only on the plaintext but also on the encryption key for each round.
● D-boxes − One mystery and one weakness were discovered in the design of Dboxes−
○ The goals of the initial and final permutations is not clear.
○ In the expansion permutation (inside the function), the first and fourth bits of
every 4-bit series are done again.
● The technology can check one million keys per second, making brute-force attacks on
DES more than 100 years long and requiring a single-processor computer.
● If it can create a computer with one million chips (parallel processing), it can check the
whole key domain in approximately 20 hours.
● DES has introduced a high cost of over a million dollars, but its cost has significantly
decreased. A 1998 computer discovered the key in 112 hours.
● In 1977, a department of 3500 web-connected computers used parallel processing to
discover a key debated by the RSA workshop in 120 days, with each computer testing
an element within the domain.
● A hidden association with 42,000 members can discover the key in 10 days, compared
to 3,500 wired computers in 120 days.
● Substitute Bytes
● Shift Rows
● Mix Columns
● Add Round Key
(Refer to question 42)
Unit 3
Define congruence and compare it with equality.
Congruence is a relation between two integers such that their difference is divisible by a
specified integer (modulus).
Find the value of x using chinese reminder theorem:
a. Discrete logarithm
X=1 (mod5)
X=6 (mod 7)
X=3 (mod5)
X=7 (mod 8)
X=5 (mod 7)
Illustrate the Diffie- Hellman key exchange algorithm.
Compute the inverse of 17 in mod 23 arithmetic. Show steps
clearly.
State Euler’s theorem.
Show with proper working that 13 is a primitive root of 19.
In Diffie-Hellman key exchange between two parties A and B
where A picks his secret key as 9 and B picks his secret as 6.
Apply 13 as the primitive root of 19, for this Diffie- Hellman
exchange and show the shared secret key. Show the math
working steps clearly.
State the Euclids algorithm with example.
Determine gcd(24140, 16762).
i. 2 pow 33 mod 30