Professional Documents
Culture Documents
Q.1. For hash functions, it is crucial to have a sufficiently large number of bits output, e.g., 160
bits. However, for MACs shorter lengths, say 80 bits are sufficed. Why? For your answer,
assume a message x is sent in the clear text together with its MAC/Hash over the channel.
[4 Marks]
Q.2. Derive the number of entries to be stored in memory and the number of bytes to be stored for
each entry for Meet in the middle attack of AES-192 double encryption. (Show all the steps)
[4 Marks]
Q.3. For a given hash function, h with an output length of n bits. Derive the average number of
comparisons and average memory requirements for the second preimage resistance attack
and collision attack on it? (Show all the steps) [4 Marks]
Q.4. Using Euclidean Algorithm, compute GCD and value of s, t for the following (Show all the
steps)
a. 198 and 243 [7 Marks]
Q.5. Consider the following substitution block cipher: (Show all the steps)
Plain-text Cipher-text
000 110
001 100
010 111
011 001
100 101
101 000
110 010
111 011
Compute the cipher-text belonging to plaintext 001 110 000 101 110 (using a block size of 3
bits) for the Electronic Code Book (ECB) mode and Cipher Block Chaining (CBC) mode
taking IV = 111. Show the intermediate steps. [7 Marks]
Q.6. Draw block diagram for below function: [12 Marks]
***********