15XT52-4
15XT52-4
Roll No:
(To be filled in by the candidate)
c) Write a short note on the following: Cryptanalytic attack, Non- Cryptanalytic attack,
Ciphertext only attack, Known plaintext attack, Chosen plaintext attack, Chosen
ciphertext attack.
3. a) What do you mean by quadratic residue? Test whether 5 is a quadratic residue
modulo 13.
b) i) Does the RSA encryption/decryption algorithm robust against factorization
attack? Justify your answer. (3)
ii) State and prove the necessary and sufficient condition for quadratic residue. (4)
c) i) Explain ElGamal key generation, encryption and decryption processes with its
proof of correctness. Also detail the possible attacks on ElGamal scheme.
(OR)
ii) Write Miller-Rabin algorithm for primality test. Prove that Miller-Rabin algorithm
for composite is a yes-biased Monte-Carlo algorithm. Using it, check whether 561
is a prime or not with the base 2.
4. a) What are the criteria for a good cryptographic hash function?
b) i) Assume we have a very simple message digest. The message digest is just one
number between 0 and 25. The digest is initially set to 0. The cryptographic hash
function adds the current value of the digest to the value of the current character
(between 0 and 25). Addition is in modulo 26. What is the value of the digest if
the message is “HELLO”? Why is this digest not secure? (3)
ii) Illustrate that how a digital signature can be used to achieve the security services
such as message authentication, message integrity and nonrepudiation. (4)
c) Explain Digital Signature Standard(DSS) algorithm in detail with its proof of
correctness. Suppose Alice chooses 𝑝 = 8081 and 𝑞 = 101. Alice selects 𝑒0 = 3,
calculates 𝑒1 = 6968 and chooses 𝑑 = 61 and computes 𝑒2 = 2038. For ℎ(𝑀) =
5000 and 𝑟 = 6, find the signature (𝑆1 , 𝑆2 ) using DSS algorithm.
5. a) In what way entity authentication differ from message authentication?
b) i) Diffie-Hellman key exchange protocol is vulnerable to man-in-the-middle attack.
Justify this statement. (3)
ii) What do you mean by zero-knowledge authentication? Does Fiat-Shamir protocol
achieve zero-knowledge authentication? Justify your answer. (4)
c) What are the advantages of challenge response protocol over the password based
authentication? Describe the challenge response protocols for both unidirectional and
bidirectional using symmetric-key cipher, asymmetric-key cipher and digital
signature.
FD/JU /END/
Page No : 2