Beruflich Dokumente
Kultur Dokumente
KALASALINGAM UNIVERSITY
(KALSALINGAM ACADEMY OF RESEARCH & EDUCATION)
KRISHNANKOIL – 626126
CHAPTER 09
PUBLIC KEY CRYPTOGRAPHY AND RSA
PART A
PART B
1. Write the algorithm of RSA and explain with an example. (16m) (Pg No: 295)
2. Perform Encryption/Decryption using RSA algorithm for the following: p=3, q=11, e=7,
m=5. (8m)
3. Identify the possible threats for RSA algorithm and list their counter measures.
(8)
4. Problems related to RSA. (9.2, 9.3, 9.4 page no. 309 7th edition)
UNIT II
CHAPTER 10
OTHER PUBLIC KEY CRYPTOSYSTEMS
PART A
1. State the use of Diffie Hellman Key exchange (Pg no: 317)
2. List out the two parameters involved in Diffie Hellman Key Exchange (Pg no: 315)
3. State the formula to calculate secret key in Diffie Hellman Key Exchange algorithm (Pg
no: 316)
4. Define Man in the Middle attack (Pg no: 317)
PART B
1. Write short notes on Diffie Hellman Key exchange algorithm[8M] (Pg no:317)
CHAPTER 11
CRYPTOGRAPHIC HASH FUNCTION
PART A
PART B
1. Explain in detail about the applications of Cryptographic Hash function(8M) (Pg no: 353)
2. Describe the functions of SHA – 512 with necessary diagrams. (16M) (Pg no: 356)
CHAPTER 13
DIGITAL SIGNATURE
PART A
1. List down the properties of the Digital signature must have. (Page.No. 422)
2. List out some of the requirements of Digital Signature (Pg No: 423)
3. What are the approaches involved in Digital Signature standard? (Pg No: 427)
4. With a neat sketch, represent the RSA and DSS approach of Digital Signature. (Fifth
edition book Pg No: 428)
PART B
UNIT III
CHAPTER 15
USER AUTHENTICATION - KERBEROS
PART A
1. List down the four means of authenticating user’s identity (page no. 476)
2. Define. One way authentication.(478)
3. Define. Mutual authentication(477)
4. List out the three treats involved in Distributed environment (Pg no: 482)
5. Define Kerberos Realm (Pg no: 493)
PART B
1. Explain in detail about Kerberos Version4 message exchange with a neat sketch.(16M)
(Pg no: 484)
2. Write short notes on environmental and Technical limitations of Kerberos
Version4.(16M) (Pg no: 495)