Sei sulla pagina 1di 1

GOVERNMENT ARTS COLLEGE, UDUMALPET

Department of Mathematics
M.Sc. Degree Model Examination- Second Semester
Elective - Cryptography
Time: 3hrs Max marks: 75
Section A (10 X 1 = 10)
Answer all Questions
1. What is the role of message authentication code?
2. Find 117mod13.
3. What is an integer factor?
4. What is the use of Pollard’s rho factoring method?
5. If f(x) = x2+1 and g(x) = x2+ x+1 then find f(x) ×g(x)mod(x3+x+1) under the field GF(2).
6. When a polynomial f(x) is said to be square free?
7. Define stream cipher.
8. What is the size of inputs and outputs of the DES algorithm?
9. Define RSA function.
10. What are the attacks against RSA?
Section B (5 X 5 = 25)
Answer all the Questions
11. a) What are the main objectives of cryptography?
[OR]
b) Discuss the properties of modular arithmetic for integers in Zn.
12. a) Discuss on prime numbers. What type of prime numbers are used in cryptography?.
[OR]
b) Detail on factoring?
13. a) Write the extended Euclidean algorithm for polynomials.
[OR]
b) Explain square free factoring technique with example.
14. a) Explain the role of S – boxes in DES algorithm.
[OR]
b) Brief on Block Ciphers.
15. a) Brief on Elliptic curve Cryptography.
[OR]
b) Write down the principles of Public Key Cryptosystem.
Section C ( 5 X 8 = 40)
(Case study)
16. a) Explain extended Euclidean algorithm with example.
[OR]
b) Describe the role of number theory in cryptography.
17. a) Explain pollard’s Rho factoring method in detail.
[OR]
b) Explain the discrete logarithm method in detail.
18. a) Explain the Finite fields of the form GF(2n) with example.
[OR]
b) Discuss on factoring polynomials over finite fields.
19. a) Explain the substitution technique and transposition technique in symmetric method.
[OR]
b) Detail on DES encryption techniques.
20. a) Describe the distribution of Secret keys using Public Key Cryptography.
[OR]
b) Discuss in detail RSA algorithm, highlight its computational aspects and security.

Potrebbero piacerti anche