What Are The Functions For Message Authentication?: What Is A Hash in Cryptography?
What Are The Functions For Message Authentication?: What Is A Hash in Cryptography?
PART B
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. Explain the various approaches of message BTL-4 Analyze C401.3 PO1,
authentication code with suitable diagrams. PO2
Why is it preferred to symmetric encryption?
2. What are the ways by which a hash code can provide BTL-2 Understand C401.3 PO1
message authentication? Explain each of them with
suitable diagrams.
3. Discuss the Message Digest-5 algorithm with suitable BTL-4 Analyze C401.3 PO1,
diagrams. Compare its performance with SHA-1. PO2
4. Discuss Secure Hash Algorithm with suitable diagrams. BTL-4 Analyze C401.3 PO1,
Compare its characteristics and variants? PO2
5. Discuss HMAC algorithm in detail with necessary BTL-2 Understand C401.3 PO1,
diagrams. PO2
6. Explain CMAC algorithm with suitable diagrams? BTL-2 Understand C401.3 PO1
7. Explain Digital signatures in detail with suitable BTL-2 Understand C401.3 PO1
diagrams.
8. Explain RSA algorithm for generating digital signature. BTL-4 Analyze C401.3 PO1,
How is it different from RSA encryption? PO2
9. Illustrate Digital Signature standard Algorithm with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
10. Illustrate Schnorr Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
11. Illustrate Elgamal Digital Signature Scheme with BTL-4 Analyze C401.3 PO1,
suitable example. PO2
PART C
Q. BT COMPE
QUESTIONS CO PO
No LEVEL TENCE
1. With a neat diagram, explain the steps involved in SHA BTL-3 Apply C401.3 PO3
algorithm for encrypting a message with the maximum
length of less than 2128 bits and produces as output a
512 bit message digest.
2. Compare SHA 1, SHA 256 and SHA 512 based on BTL-4 Analyze C401.3 PO2
various parameters and emphasizing on their
compression functions.
3. Explain the process of deriving eighty 64 bit words BTL-2 Understand C401.3 PO3
from the 1024 bits for processing of a single block and
also discuss single round function in SHA 512
algorithm. Show the values of W16, W17, W18, W19.
4. Alice chooses q=101 and p=7879. Alice selects h=3 BTL-5 Evaluate C401.3 PO4
and calculates g. Alice chooses x=75 as the private key
and calculates y. Now, Alice can send a message to
Bob. Assume that H(M)=22 and Alice choose secret
number k=50. Verify the signature.
5. Explain the following based on Digital Signature BTL-6 Create C401.3 PO6
Algorithm:
a. DSA specifies that if the signature generation process
results in a value of s = 0, a new value of k should be
generated and the signature should be recalculated.
Why?
b. What happens if a k value used in creating a DSA
signature is compromised?
6. Alice chooses prime p=19, a=10 and private key BTL-5 Evaluate C401.3 PO3
XA=16. Calculate public key. If H(M)=14 and K=5.
Compute the signature using Elgamal Digital signature
scheme and verify the same.