Lesson 4

Public Key Cryptography

Topics

Appeared in previous exams

Appeared in previous exams

1 If generator g=2 and n or p=11, using Diffie-hellman algorithm solve the following:

i. Show that 2 is primitive root of 11.

ii. If A has public key 9 what is A’s private key.

iii. If B has public key 3 what is B’s private key.

iv. Calculate the shared secret key.

Marks: 10 M

Year: Dec 2013

Answer: ... (more)
2 Short note on RSA algorithm.

Mumbai University > COMPS > Sem 7 > Cryptography and System Security

Marks: 10 M

Year: Dec 2013

Answer: ... (more)
3 What is Feistel Cipher?

Mumbai University > COMPS > Sem 7 > Cryptography and System Security

Marks: 5 M

Year: May 2012

Answer: ... (more)
4 Does public key infrastructure use symmetric or asymmetric encryption? Explain.

Mumbai University > COMPS > Sem 7 > Cryptography and System Security

Marks: 5 M

Year: Dec 2013

Answer: ... (more)
5 Using the RSA algorithm, encrypt the following:

1. p=3, q=11, e=7, M=12

2. p=7, q=11, e=17, M=25

3. Find the corresponding ds for (1) and (2) and decrypt the ciphertexts.

Marks: 10 M

Year: May 2012

Answer: ... (more)
6 Explain working of DES detailing the Fiestel structure.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 10 Marks

Year: Dec 2015

Answer: ... (more)
7 Key generation in IDEA.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5

Year: Dec-15

Answer: ... (more)
8 Explain the working of DES

Mumbai University > EXTC > Sem 7 > Data Compression and Encryption

Marks: 10 M

Year: MAY 2012, 2013, 2014

Answer: ... (more)
9 Key generation in IDEA.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5

Year: Dec-15

Answer: ... (more)
10 what is the cipher text when you encrypt message m=10, using the public key?

In an RSA system the public key (e,n) of user A is defined as (7,119). Calculate Φn and private key d. what is the cipher text when you encrypt message m=10, using the public key?

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 10 Marks

Year: Dec 2015

Answer: ... (more)
11 Explain how a key is shared between two parties using Diffie-Hellman by exchange algorithm. What is the drawback of this algorithm?

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 10 Marks

Year: Dec 2016

Answer: ... (more)
12 Elaborate the steps of key generation using RSA algorithm.

Mumbai University > Computer Engineering > Sem 7 > Cryptography and System Security

Marks: 5 Marks

Year: May 2016

Answer: ... (more)
14 Explain Diffie Hellman key exchange algorithm with example.

Mumbai University > EXTC > Sem 7 > Data Compression and Encryption

Marks: 10 M

Year: Dec 2012, May 2014, May 2015

Answer: ... (more)
15 Explain the principle of Public key cryptography

Mumbai University > EXTC > Sem 7 > Data Compression and Encryption

Marks: 5 M

Year: Dec 2012

Answer: ... (more)