Anda di halaman 1dari 3
marae (DY oveey op tmmere C LTE TTL MULTIMEDIA UNIVERSITY FINAL EXAMINATION ‘TRIvesTER 1, 2016/2017 TAC3121 - APPLIED CRYPTOGRAPHY (Al Sections / Groups) 11" OCTOBER 2016 9.00am~11.008,m (2 Hours) INSTRUCTIONS TO STUDENE ‘This Cuestion paper consists of 3 pages with 5 Questions oly, Attempt ALL questions. Al questions carry equal masks (10) andthe distribution of the marks foreach question is given 3. Pleaseprint all your answers inthe Anewer Booklet provided. uestion 1 4s) State fits posible to use « hash function to construct a block cipher with a structure similar to DES because a ash function i one way and a block cipher ust be reversible. (3) 18) Describe why there is a need for public-key centticateand explain the process involved in crifoate creation? (3) Je) State the diffrence between diferental and linear cryptanalysis. (2) 1d) State the diffrence between difson and confusion. (2) stion 2 2a) Explain a digital signature and how is it wsed inthe pubic key certification. (3) 2) Explain why isthe middle portion of tiple DES a decryption rather than an encryption (2) 2s) Explain the purpose of S-boxes in Data Encryption Standard (DES).(1) 24) Explain how confidentiality and message integrity are implemented in respect to cexyptosrapty. 242) ‘Question 3 3a) Users A and B us the Diffs Hellman key exchange technique with a common and a primitive root @ = 7, ') fuser Aas private key 24 = S, compute A’s public key Tq. (1) ii) fuser B has private key r= 12, compute Bs public key". (1) ii) Determine the shared secret key! (2) 38) Determine the RSA private key given the parameters below. (3) Pr iLg=3,e3 3e) Explain how hash Function is used to create digital signatures wit the help ofa diagram, (3) Continved.. ® 7 ‘Question 4 48) Describe TWO disadvantages of Symmetic Key Cryptography, (2) 40) Dap the security advantage of liptic Curve Ceyptogsaphy. (2) 42) Explain and give usage expe cach) for Electronic Codebook Book (ECB) and Cipher Block Chaining (CBC), 4) 42) Describe ONE advantage and ONE disadvantage of using Counter (CTR), (2) tion S 58) Compute the multiplicative inverse ofeach nonzero element in Zs. (2) 58) For group Sn ofall permutations of distinct symbols, (2) §) Compute the number of elements in Sx? 1) Show that Sn isnot abelian form > 2 5s) Using Fermat Theorem, compute" mod 11. (2) Sa) Compute ged (24140,16762), (4) Fn of Page

Anda mungkin juga menyukai