IT342 - Final - Exam - Fall - 2019-2020
IT342 - Final - Exam - Fall - 2019-2020
Question 1 (10 Marks): Choose the correct answer of the following sentences:
i) In the CBC mode, the plaintext block is XORed with previous ciphertext block
before encryption.
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext
a. iii) b ii) and iv) c. All the Statements are true d. i) ii) and iv)
a. same symbol b. provide two symbols for each c. another d. All of them
5. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=8
and thus find the CT.
a) 23 b) 64 c) 134 d) 54
Question 2 (6 marks): Calculate the values for B, C, D, E and F in the diagram for S-
DES encryption below, where A = 11011000 and K1 = 01010000. You may use the
information below the diagram.
E/P P4
4 1 2 3 2 3 4 1 2 4 3 1
1 0 3 2 0 1 2 3
S0 = 3 2 1 0 S1= 2 0 1 3
0 2 1 3 3 0 1 0
3 1 3 2 2 1 0 3
E/P
A
+ K1
B C
S0 S1
D E
P4
F
Question 3 (9 marks): You have two encryption schemes, which are designed to encrypt
messages of n bits, where n ≥ 1 is some fixed integer. You know that only one of the two
schemes is provably secure (IND-CPA) under some well-studied assumption, but you
don’t know which one. Describe how will you encrypt an n-bit message securely (IND-
CPA). Try to come up with the most efficient scheme. Justify security of your approach.
You don’t have to give a formal proof, but try to come up with a convincing argument.
Question 4 (10 Marks): Answer the questions below regarding key generation with
Diffie-Hellman and RSA.
(a) Perform encryption and decryption using the RSA algorithm, p=17, q=31, e=7,
m=2.
(b) User A and B exchange the key using Diffie-Hellman algorithm. q=11 X A=2 XB=3.
Find the value of YA , YB and k?
(c) What is an RSA signature for a message m = 4? Assume the following RSA
parameters: a private exponent d = 17 and a composite n = 21.
Question 5 (10 Marks): Complete the following sentences:
-------------------------, --------------------------
3. Give the five modes of operation of Block cipher --------, --------, --------, --------, -------
5. The principle attraction of ECC compared to RSA, is that it appears to offer equal
Standard) is a well-known –--------------- key cipher. Both ciphers are block ciphers.
8. Alice has a message to send to Bob and she wants to encrypt the message using
public-key cryptography so that no one other than Bob can read it, she does so by
using –---------------------------.
Question 6 (15 marks): Considering the following scenario, a company has some security
issues when their staff exchange electronic information. These problems are enumerated
in the following points:
2. Members can not be sure that the income information reach them without any change
(as they sent).
3. There is no way for the staff to identify the party who sent them the information.
Build a cipher system that sort out the problems stated above.