CNS_ESE_QP2
CNS_ESE_QP2
b. Zigzag cipher is a transposition cipher that jumbles up the order of the [1] Ap CO1
letters of a message using a basic algorithm. Convert the Given Plaintext
“CRYPTOGRAPHY” into ciphertext using Rail fence with two rails
technique.
c. Calculate the encryption and decryption for the following plaintext [1] Ap CO1
P=”MEET ME” by using caser cipher with Key k = 3?
d. Fermat’s Theorem: If ‘p’ is a prime number and ‘a’ is a integer number not [1] Ap CO2
divisible by ‘p’ then ap-1 congruent to 1(modp). Prove Fermat’s theorem
holds true for prime number 13 and integer 11.
e. In an RSA system, the public key of a given user is e=31, n=3599. [1] Ap CO2
What is the private key of the user?
f. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers. [1] Ap CO2
Calculate 2P if P = (4, 3.464)?
g. Consider that B wants to send a message m that is digitally signed to A. [1] An CO3
Let the pair of private and public keys for A and B be denoted by K-x and
K+x for x=A,B respectively. Let Kx(m) represent the operation of encrypting
m with a key Kx and H(m) represents the message digest. Examine and
find the Correct way of sending the message ‘m’ along with the digital
signature to A?
h. The input is viewed as a sequence of n-bit blocks. The input is processed [1] Ap CO3
one block at a time in an iterative fashion to produce an n-bit hash value.
Apply first simple hash function to find the output hash value for the
following message blocks.
CA<<A>>=CA{V,SN,AI,CA,UCA,A,UA,AP}
j. Analyze, why the Change Cipher Spec Protocol is separated rather than [1] An CO4
including a change cipher spec message in the Handshake Protocol in SSL
and TLS?
k. Distinguish between transport mode and tunnel mode in IP sec? [1] An CO4
l. What are the limitations of firewalls? [1] R CO4
Page 1 of 3
18BT764/2
2. a. Consider a desktop publishing system used to produce documents for [6] U CO1
various organizations.
Page 2 of 3
18BT764/2
c. The Euclidean algorithm is a way to find the greatest common divisor of [6] Ap CO2
two positive integers, a and b for a −1 modulo n and find multiplicative
inverse for the following.
d. One elliptic curve encryption/decryption is to be performed over Z11. The [6] Ap CO2
Cryptosystem parameters are E11(1, 6) and the base point G=(2, 7).
Party B's secret key is nB = 7.
4. a. List and explain the PGP services and explain how PGP message [6] U CO3
generation is done with a neat diagram.
b. Secure Hash Algorithm 512, is a hashing algorithm used to convert text of [6] Ap CO3
any length into a fixed-size string. Each output produces a SHA-512 length
of 512 bits (64 bytes). Consider the Input message: “abc” and Create a 16
word message schedule (W0 to W15) of input sequence for SHA512
Processing of Single Block.
(OR)
c. List the main features of SHA-512 cryptographic hash function. What kind [6] U CO3
of compression function is used in SHA-512?
d. Analyze the Cryptographic algorithms used in S/MIME and Explain [6] An CO3
S/MIME certification processing.
5. a. Is it possible in SSL for the receiver to recorder SSL record blocks that [6] U CO4
arrive out of order? If so, explain how it can be done. If not, why not?
b. Consider the following fragment in an authentication program: [6] An CO4
username = read_username();
password = read_password();
if username is "133t h4ck0r"
return ALLOW_LOGIN;
if username and password are valid
return ALLOW_LOGIN
else return DENY_LOGIN
Page 3 of 3