Assignment - 1
Assignment - 1
S.No Questions CO K
(OR)
Prepared by Approved by
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
18AIC307T & CRYPTOGRAPHY AND NETWORK SECURITY
ASSIGNMENT - II
Year/Semester & Branch: III / VI & AI&DS Given Date:
Max. Marks: 30 Submission Date:
QUESTIONS
S.No Questions CO K
1. a) Find 11 13 mod 53 .
b) Find 321 mod 11 using Fermat’s theorem.
c) Using Euclidean algorithm calculate GCD (21,300) & GCD (125, 20) CO3 K2
d) Find GCD of (1403, 1081)
e) Find gcd(1970, 1066) using Euclid’s algorithm. (10 M)
In a Chinese remainder theorem n=210, n1=5, n2=6 n3=7 and compute j -1
2. (3, 5, 2) i.e. given x1=3, x2=5, x3=3. Compute x. (10 M) CO3 K2
Write the working of RSA and choose an application of your choice for
3. CO3 K2
RSA and show how encryption and decryption is carried out. (10 M)
(OR)
Apply Chinese Reminder Theorem to find X for the given set of congruent
equations and state CRT.
4. X 2 (mod 3) CO3 K3
X 3 (mod 5)
X 2 (mod 7) (15 M)
a) For the given values p = 19, q = 23 and e = 3. Find n, (n) and d using
RSA algorithm.
b) Using the RSA algorithm, encrypt the following:
5. CO3 K3
a) p = 3, q = 11, e = 7, M = 12
b) p = 7, q = 11, e = 17, M = 25
c) Find the corresponding ds for a) and b) and decrypt the ciphertext(15 M)
(OR)
Prepared by Approved by
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
18AIC307T & CRYPTOGRAPHY AND NETWORK SECURITY
ASSIGNMENT - III
Year/Semester & Branch: III / VI & AI&DS Given Date: 14.05.2024
Max. Marks: 30 Submission Date: 20.05.2024
QUESTIONS
S.No Questions CO K
2. Highlight and explain the steps in Digital Signature Algorithm (DSA). (10 M) CO4 K2
Describe the role and significance of HMAC in ensuring message integrity and
3. authenticity in data communication. Highlight its differences from other CO4 K2
authentication methods. (10 M)
(OR)
Alice Chooses Q = 101 and P = 7879. Assume (q, p, g and y) : Alice’s Public
key. Alice selects h = 3 and calculate g. Alice chooses x = 75 as the private
4. CO4 K3
key and calculates y. Now, Alice can send a message to Bob. Assume that
H(M) = 22 and Alice choose secret no K = 50. Verify the Signature. (15 M)
Describe the algorithmic steps involved in generating a CMAC using a block
cipher. Explain how CMAC handles variable-length messages and the key
5. CO4 K3
derivation process. Compare CMAC with CBC-MAC (Cipher Block
Chaining-MAC). (15 M)
(OR)
a) Analyze the Core Functions and Key Protocols in Public Key Infrastructure
(PKI). Discuss the Significance, Mechanisms, and Interactions of Functions
such as Certificate Authorities (CAs), Registration Authorities (RAs),
Certificate Revocation, and the Key Protocols employed in PKI. Evaluate the
Impact of these Functions and Protocols on Secure Communication and Trust
6. CO4 K4
Establishment in Digital Environments. (15M)
b) Analyze the X.509 standard, its structure, and its role in defining the format
for public key certificates, including the components and extensions used in
certificates. (15M)