0% found this document useful (0 votes)
14 views

ISC Assignment

The document outlines an assignment with 5 sets of questions (Sets A through E). Each set contains 2 questions related to cryptography and information security concepts. The questions cover topics like RSA algorithms, CMAC vs HMAC, hash functions, digital signatures, Diffie-Hellman key exchange, SHA-512, MD5, ElGamal cryptography, and optical asymmetric encryption padding. The questions vary in their level of difficulty from levels 4 to 6.

Uploaded by

Adarsh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

ISC Assignment

The document outlines an assignment with 5 sets of questions (Sets A through E). Each set contains 2 questions related to cryptography and information security concepts. The questions cover topics like RSA algorithms, CMAC vs HMAC, hash functions, digital signatures, Diffie-Hellman key exchange, SHA-512, MD5, ElGamal cryptography, and optical asymmetric encryption padding. The questions vary in their level of difficulty from levels 4 to 6.

Uploaded by

Adarsh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment-2

Set –A
S. no Question Marks Cos
1. Delineate the principle of RSA Algorithm by taking an example. 5marks CO4

2. Analyse the structure of CMAC. Compare CMAC and HMAC techniques. 5 marks CO5

Set –B
S. no Question Marks Cos
1. Examine the role of Hash functions in Information Security. 5 marks CO5

2. Delineate the principle of RSA Algorithm by taking an example 5 marks CO4

Set –C
S. no Question Marks COs BT Level
1. Throw light on Digital Signature. Elaborate any one Digital Signature Algorithm. 5 marks CO4 Level 5

2. Elaborate the various attacks on Diffie Hellman Key Exchange scheme. 5 marks CO5 Level 6

Set –D
S. no Question Marks COs BT Level
1. Delineate SHA-512 hash algorithms along with its features. 5 marks CO4 Level 5

2. Depict MD5 Algorithm in detail and compare its performance with SHA-512 5 marks CO5 Level 6

Set –E
S. no Question Marks COs BT Level
1. Comprehend EIGamal Public Key Cryptosystem. 5 marks CO4 Level 4

Convert <MEET= using


2. 5 marks CO5 Level 5

Hill cipher with the key


matrix
Convert the cipher text
back to plaintext. Key=
HILL
Convert <MEET= using
Hill cipher with the key
matrix
Convert the cipher text
back to plaintext. Key=
HILL
Convert <MEET= using
Hill cipher with the key
matrix
Convert the cipher text
back to plaintext. Key=
HILL
Convert <MEET= using
Hill cipher with the key
matrix
Convert the cipher text
back to plaintext. Key=
HILL
Delineate Optical Asymmetric Encryption Padding in detail with Encryption and
Decryption Process?

You might also like