Professional Documents
Culture Documents
Semester
UNIT-I
1. What is cryptology?
Cryptology is the study of cryptography and cryptanalysis.
9. How many keys are required for two people to communicate via a cipher?
If both sender and receiver use the same key, the system is referred to as symmetric, single
key, secret key, or conventional encryption. If the sender and receiver each use a different
key, the system is referred to as asymmetric, two-key, or public-key encryption.
10. What is the difference between a block cipher and a stream cipher?
A block cipher processes the input one block of elements at a time, producing an output
block for each input block. A stream cipher processes the input elements continuously,
producing output one element at a time, as it goes along.
16. Which parameters and design choices determine the actual algorithm of a feistel
cipher?
Block size
Key size
Number of rounds
Sub key generation algorithm
Round functions
Fast software encryption or decryption
Ease of analysis
19. What is the difference between a mono alphabetic cipher and a poly alphabetic
cipher?
Mono alphabetic cipher: Here a single cipher alphabet is used.
Poly alphabetic cipher: Here a set of related mono alphabetic substitution rules is used.
UNIT II
6. What was the original set of criteria used by NIST to evaluate candidate AES
cipher?
The original set of criteria used by NIST to evaluate candidate AES cipher was:
Security
Actual Security
Randomness
Soundness
7. What was the final set of criteria used by NIST to evaluate candidate AES
ciphers?
The final set of criteria used by NIST to evaluate candidate AES ciphers was:
General Security
Software Implementations
Restricted-Space Environments
Hardware Implementations
Attacks On Implementations
Encryption vs. Decryption
Key Agility
Other Versatility And Flexibility
Potential for Instruction-Level Parallelism
shift. Second Row a 1-byte circular left shift is performed. Third Row a 2-byte circular left
shift is performed. For the Fourth Row a 3-byte circular left shift is performed. In Inverse Shift
Row, each row perform circular right shift.
14. What is the difference between Sub Bytes and Sub Word?
Sub Bytes: Sub Bytes uses an S-box to perform a byte-by-byte substitution of the block. Sub
Word: Sub Word performs a byte substitution on each byte of its input word,using the Sbox.
15. What is the difference between Shift Rows and Rot Word?
Shift Rows:
Shift Row is simple permutation. It shifts the rows circularly left or right.
Rot Word:Rot word performs a one-byte circular left shift on a word. This means that an
input word [b0,b1,b2,b3] is transformed into [b1,b2,b3,b0].
20. Why do some block cipher modes of operation only use encryption while others
use both encryption and decryption?
Some block cipher modes of operation only use encryption because the input is set to some
initialization vector and the leftmost bits of the output of the encryption function are XORed
with the first segment of plain text p1 to produce the first unit of cipher text C1 and it is
transmitted. While in decryption, the cipher text is XORed with the output of the encryption
function to produce the plain text.
UNIT III
Left cicular rotation: The cyclic rotation of word x left by y bits is denoted by
x<<<y. The inverse is the right circular rotation of word x by y bits, denoted by
x>>>y.
11
11. List ways in which secret keys can be distributed to two communicating parties.
A can select a key and physically deliver it to B.
A third party can select the key and physically deliver it o A and B
If A and B have previously and recently used a key, one party can transmit the
new key to the other, encrypted using the old key
If A and B each has an encrypted connection to a third party C, C can deliver a
key on the encrypted links to A and B
12. What is the difference between a session key and a master key?
Session key Master key Communication between end systems is encrypted using temporary
key, often referred to as a session key. Session keys are transmitted in encrypted form,
using master key that is shared by the keys distribution center and an end system. The
session key is used for the duration of a logical connection, such as a frame relay
connection or transport connection, and then discarded. For each end system or user, there
is a unique master key that it shares with the key distribution center. These master keys
must be distributed in some fashion.
12
17. Why is the middle portion of 3DES a decryption rather than an encryption?
Decryption requires that the keys be applied in reverse order:
P=Dk1[Ek1[P]]
This results in a dramatic increase in cryptographic strength.The use of DES results in a
mapping that is not equivalent to a single DES encryption.
18. What is the difference between the AES decryption algorithm and the equivalent
inverse cipher?
In AES decryption, we use inverse shift rows inverse sub bytes, add round key, inverse mix
columns. But in equivalent inverse cipher, we interchange inverse shift rows and inverse sub
bytes.
13
Unit IV
1. Differentiate public key encryption and conventional encryption.
Conventional Encryption Public key Encryption
1. Same algorithm with 1.Same algorithm is used for
same key used for encryption & decryption with
encryption and decryption. a pair of keys.
2. Sender & receiver must 2.Sender & receiver have one of
share the algorithm and key. the matched pair keys.
3. Key must be kept secret. 3. Any one of the key must be
kept secret.
4.Pe rform encryption and decryption using RSA alg. For the following.
P=7; q=11; e=17; M=8.
Soln:
n=pq
14
n=7*11=77
(n)=(p-1) (q-1)
=6*10 = 60
e=17
d =27
C= Me mod n
C = 817 mod 77
= 57
M = Cd mod n
= 5727 mod 77
=8
5. User A & B exchange the key using Diffie Hellman alg. Assume
=5 q=11 XA=2 XB=3. Find YA, YB, K.
Soln:
YA = XA mod q
=52 mod 11
=3
YB = XB mod q
= 53 mod 11
=4
KA = YBXA mod q
= 42 mod 11
=5
KB = YAXB mod q
= 33 mod 11
=5
16
In internal error control, an error detecting code also known as frame check sequence or
checksum. External error control: In external error control, error detecting codes are
appended after encryption.
14.Define Kerberos.
Kerberos is an authentication service developed as part of project Athena at
MIT.The problem that Kerberos address is, assume an open distributed environment in
which users at work stations wish to access services on servers distributed throughout the
network.
17
18
Unit V
1. What are the services provided by PGP services
Digital signature
Message encryption
Compression
E-mail compatibility
Segmentation
MIME version.
Content type.
Content transfer encoding.
Content id.
Content description.
Generate Ks.
Encrypt Ks using recipients public key.
RSA algorithm used for encryption.
Prepare the recipient info block.
Encrypt the message using Ks.
Authentication
Confidentiality
Key management.
21
Access control.
Connectionless interpretty.
Data origin authentication
Rejection of replayed packet.
Confidentiality.
Limited traffic for Confidentiality.
2) Misfeasor
3) Clandestine user
24