Scheme
Scheme
PART A
Answer ALL Questions
1. a)Define Euler’s totient function or phi function and determine Euler’s Totient
function of (231).
b) Determine gcd(4655,12075)
Scheme & Answer Key:Definition: 1 marks, Finding Eulers Totient function 2
marks Finding GCD 2 marks
3. What are the requirements of hash function ?Differentiate between MAC and
Hash function.
Scheme & Answer Key:Explanation: 2 marks differentiation 3 marks
4. What are viruses? What are the different types of viruses? What are the pre-
cautions to be taken against virus?
Scheme & Answer Key:Explanation: 2 marks Types:1 mark differentiation 3
marks
4 x 5 marks = 20 marks
PART B
5. a) What is a ring? List its properties. When does a ring become a field?
b)State Fermat’s theorem. Using Fermat’s theorem, find 3201 mod 11
Scheme & Answer Key:a)Explanation: 1 mark properties: 2 marks Explanation:
2 marks b)statement:2 marks solution:3 marks
OR
1
6. a) State and explain the importance of Chinese Remainder theorem in Cryptog-
raphy
b)(ii) Using CRT,find x from the equations, x ≡ 88 mod 6 and x ≡ 100 mod 15
Scheme & Answer Key:a)Explanation: 5 marks b)solution: 5 marks
7. a)Use Playfair cipher to encrypt the message “We live in an insecure world ”with
secret key “GUIDANCE”. Decrypt the Playfair code“SYICHOLER ”using the
keyword alphabet.
b)Write about Mix-Columns Transformation and Add-Round Key Transforma-
tion of AES cipher.
Scheme & Answer Key:a) solution:5 marks b)Explanation: 5 marks
OR
8. What is the purpose of the S-boxes in DES? Draw the general structure of DES
and explain the encryption and decryption process.
Scheme & Answer Key:Explanation: 5 marks Diagram:5 marks
9. Discuss RSA with computations for public key cryptography. Also perform the
Encryption and decryption for p =7 , q = 11, e = 17 and m = 8.
Scheme & Answer Key: discussion: 6 marks solution: 4 marks
OR
10. What are the basic mechanisms involved in digital signatures?List the properties
of digital signature scheme. Explain the two approaches to digital signature.
Scheme & Answer Key:Explanation: 10 marks
11. a)Using elliptic curve cryptography, explain how secret keys are exchanged and
messages are encrypted.
b)Users A and B use Diffie-Hellman key exchange scheme using prime q=71 and
primitive root α =2.
i)User A has private key Xa=5, What is the public key of A: Ya?
ii)User B has private key Xb=12, what is the public key of B: Yb?
iii)What is the shared secret key?
Scheme & Answer Key:a) Explanation: 5 marks b)solution 2+2+1 marks
OR
12. What is a firewall? What is the need for firewalls? Describe different techniques
used by firewalls to control access and enforce a security policy.
Scheme & Answer Key:Explanation: 10 marks
4 x 10 marks = 40 marks