Cryptography Model Question Paper Final
Cryptography Model Question Paper Final
Key =
b Illustrate the overview of Data encryption Standard with necessary 9 2 2 2
diagram and highlights its operations.
c Describe the four types of transformation functions used in AES. 9 2 2 2
Unit – II 18
2 a In a public key system, using RSA algorithm you intercept the cipher 9 4 2 2
text C = 10 sent to a user whose public key is e = 5, n = 35. Perform
decryption to recover the Plain text M and also compute user’s private
key.
b Explain and compare how Diffie-Hellman key exchange algorithm 9 3 2 2
useful in evaluate Man-in-the-Middle Attack concept.
c Consider an ElGamal scheme with a common prime q = 71 and a 9 4 2 2
primitive root α = 7.
a. If B has public key YB = 3 and A chose the random integer k = 2, what
is the ciphertext of M = 30?
b. If A now chooses a different value of k so that the encoding of M = 30
is C = (59, C2), what is the integer C2?
Unit – III 18
3 a Summarize the applications of cryptographic hash functions 9 3 3 2,3