Sie sind auf Seite 1von 2

Year : 2014-2015

UNIT III
PUBLIC KEY CRYPTOSYSTEMS

Sem.: EVEN

Subject Code:

NE 7202

Branch

ME-CSE

Subject Name:

NETWORK AND INFORMATION SECURITY

Year/Sem

I/ II

PART A
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.

List ways in which secret keys can be distributed to two communicating parties.
What is the difference between a session key and a master key?
What are the two basic functions used in encryption algorithms?
How many keys are required for two people to communicate via a cipher?
What is the role of session key in public key schemes?
What is the difference between modular arithmetic and ordinary arithmetic?
What are the principal elements of a public-key cryptosystem?
What are the roles of the public and private key?
What are three broad categories of applications of public-key cryptosystems?
What requirements must a public key cryptosystems fulfill to be a secure algorithm?
Briefly define a group, ring and field
Find the GCD of 2740 and 1760 using Euclidian algorithm
Define congruences.
Define Chinese remainder theorem.
What is modular exponentiation?
What is the use of Fermats theorem?
Define Eulers Theorem.
What is meant by three pass protocol?
Show that 3 is a primitive root of 7.
Find the primitive roots of 11
When an integer Alpha, less than n is said to be the primitive root of n?
Define factoring
Name any two methods for testing prime numbers.
How do you determine a given number is prime or not?
What is the difference between statistical randomness and unpredictability?
Describe in general terms an efficient procedure for picking a prime number.
Where the miller-rabin algorithm is used?
Define Primality Test
Mention the techniques of attacking RSA.
What is meant by ELGamal Cryptosystem
What is public key certificate?
What is a digital Signature?
What are the two approaches of digital signatures?
What are the properties a digital signature should have?
What is a one-way function?
What is a trap-door one-way function?
Define Finite fields.
What are elliptic curve cryptosystems?
What is the zero point of an elliptic curve?
Why Elliptic Curve Cryptography is considered to be better than RSA?
What is life cycle of key?
What is a key distribution center?
What are two different uses of public-key cryptography related to key distribution?
List four general categories of schemes for the distribution of public keys.
What are the essential ingredients of a public-key directory?
What is a public-key certificate?
What are the requirements for the use of a public-key certificate scheme?
User A and B exchange the key using Diffie-Hellman algorithm. Assume =5 q=11 X A=2 XB=3. Find the value of
YA, YB and k.

49.
50.
51.
52.
53.

State weather symmetric and asymmetric cryptographic algorithms needs key exchange
What are the two important key issues related to authenticated key exchange?
What are the properties a digital signature should have?
How digital signature is different from conventional? Give any two.
Define PKI

PART B
1. Explain in detail about public key Cryptography with neat diagram
2. Write short notes on Chinese Remainder theorem with an example.
3. Explain Fermat and Eulers theorem with an example.
4. Write short notes on Legendre and Jacobi symbols with an example.
5. (i)Write the algorithm of RSA and explain with an example as p=11, q=5, e=3 and PT=9.
(ii) What attacks are possible on RSA algorithm?
6. Discuss in detail RSA algorithm, highlighting its computational aspects and security and Perform decryption and
encryption using RSA algorithm with p=3; q=11; e=7 and N=5.
7. Explain the concept of continued fractions with an example.(i)Pollard p-1 algorithm
(ii) Pollard Rho Method
8. Explain the Miller-Rabin Algorithm.
9. Explain in detail about El-Gamal Crypto system. Consider an ElGamal scheme with a common prime q=71 and
primitive root =7.If B has public key YB =3 and A chose the random integer k=2 what is the cipher text of M=30?
10. Consider an ElGamal scheme with a common prime q=11 and primitive root =2 . k=2
If A has public key XA =5 What is As private key YA , If user B has private key XB=12 what is Bs public key YB .
What is the cipher text of M=30?
11. (i) Explain in detail about Digital signature with diagrams
(ii). Explain how birthday attack is done
12. Write and explain the Digital Signature Algorithm, with a sketch, explain signing and verifying functions of DSA.
13. Explain Finite Fields with their application in cryptography.
14. Explain in detail about Elliptic curve Cryptography with an example
15. How do elliptic curves take part in Encryption and Decryption process
16. State the requirements for the design of an Elliptic Curve Crypto system. Using that, explain how secret keys are
exchanged and messages are encrypted?
17. Describe in detail about symmetric key distribution and Asymmetric key distribution
18. (i) Explain in detail about distribution of public keys
(ii) Explain in detail about private key distribution
19. Explain in detail about following in detail with diagram i) Public key cryptosystem Secrecy
ii) Public key
cryptosystem Authentication iii) Public key cryptosystem Secrecy &authentication
20. Explain briefly Diffie Hellman key exchange algorithm with its pros and cons. Users A and B use the Diffie Hellman
Key Exchange technique with a common prime q=71 and primitive root =7.If user A has private key XA=5, what is As
public key YA?
21. Explain in detail about the PKI

Prepared by:

Verified by:

M.Azhagiri.
Asst.Prof./ CSE

Dr. U.V. Arivazhagu


HOD/ CSE

Das könnte Ihnen auch gefallen