Sei sulla pagina 1di 2

Birla Institute of Technology & Science, Pilani

Work Integrated Learning Programmes Division


First Semester 2019-2020

Mid-Semester Test
(EC-2 Regular)

Course No. : BITS ZC463 / CSI ZC463


Course Title : Cryptography
Nature of Exam : Closed Book No. of Pages = 02
Weightage : 35% No. of Questions = 03
Duration : 2 Hours
Date of Exam : 22/09/2019 (FN)
Note to Students:
1. Please follow all the Instructions to Candidates given on the cover page of the answer book.
2. All parts of a question should be answered consecutively. Each answer should start from a fresh page.
3. Double quotation marks are not part of the key or the message.
4. Please do not copy or explain the question itself. There are no marks for it.
5. Answers without proper technical justification will not be considered. Please answer to-the-point avoiding unnecessary texts
and diagrams. There are no extra credits for lengthy answers.

Q.1. Answer the following questions: [1x5 = 5 Marks]

A. Answer in hexadecimal: 0xA1B2 ⊕ 0xC3D4.


B. Write one attack type each on confidentiality and availability as described in OSI security
architecture.
C. An anti-social activist sends a threatening email to a government official and later does not
accept it. What type of integrity attack involved is this?
45
D. Solve using Fermat's or Euler's Theorem: 3 mod 23.
E. Perform the primality testing on the integer 409 using square root method.

Q.2. Answer the following questions: [2x5 = 10 Marks]

A. Considering space as the 27th character in case insensitive English, decrypt the "EQOGBQP"
using Caesar Cipher with k = 2.
B. One of the primitive roots of 19 is 2. Calculate the value of dlog 2, 19 (224).
C. Using the keyword "URI" and the Vigenère Cipher technique, encrypt the message
"NOTERRORISM".
D. How many elements will be present in the set Z1331* ?
E. There are two matrices and . Can they become keys for the Hill Cipher Algorithm?
Which one for which key?

Q.3. Answer the following questions: [4x5 = 20 Marks]

A. Using the keyword "AJITDOVAL" and the Playfair Cipher technique, encrypt the message
"SURGICALSTRIKE". Note that alphabets I and J need to share the same matrix cell.

B. A PRNG is defined as . If the initial seeds available are 1 and 2, which


seed would you chooses and why?

Page 1 of 2
C. Feistel Ciphering is performed on the plaintext 00101000. The key (K) for all the rounds is
X
selected as 7 and the function Fi for the ith round and input X is defined as Fi(X) = (2.i.K) . No
initial permutation and final swapping are done and mod-15 mathematics is used in all the
calculations. Find out the ciphertext after two rounds.

D. Two hosts agree upon a prime number 499 and one of its primitive roots as 7. The private
random keys they generate are 3 and 4. What shared key will they individually generate
through Diffie-Hellman Key Exchange (DHKE) Algorithm? Answer in the final reduced form.

E. Two prime numbers are selected as p = 41 and q = 17 for the RSA Algorithm. Which one of 32
or 49 would be a valid choice for the public exponent?

**********

Page 2 of 2

Potrebbero piacerti anche