You are on page 1of 2

UNIVERSITY OF CENTRAL PUNJAB

(Faculty of IT&CS)
Information Security
Assignment No 3 Date: 06 Jun 2023
Total Marks: 100 Due Date: 09 Jun 2023
Ques 1:
a) What is the advantage of AES over DES.
b) AES key expansion algorithm expands the given key into an array of words. How many words will
be there in expanded key array when AES uses a 128 bit key, and why.
c) In AES, what is the advantage of encryption being relatively simpler than decryption.
d) Explain the differences between Symmetric and Asymmetric key encryption systems. Can you
achieve authentication using Symmetric key systems; why or why not.
e) Describe the roles of public and private keys in a Public-key crypto system.
f) Briefly explain the various uses of Public-key encryption algorithms.
g) List the different types of attacks that are possible in a Public-key crypto system. What weaknesses
make these attacks possible, and what are the possible solutions.
h) List the different approaches to attack the RSA algorithm.
i) If A wants to send a message to B with authentication and using public-key cryptography, how this
will be achieved. Draw block level diagram of the operation.
j) Describe how an attacker can launch Man-in-the-Middle attack against Diffie Hellman key
exchange mechanism.
k) Explain the key sizes supported by AES and the corresponding number of rounds for each key
size.
l) Describe the main components and steps involved in the AES algorithm.
m) Discuss the differences between the AES encryption and decryption processes.
n) In AES, the S-box substitution layer plays a crucial role in achieving confusion. Explain how the
S-box substitution works and why it is important in AES.
o) Explain the key generation process in RSA, including the generation of public and private keys.
p) Describe the steps involved in the RSA encryption process, including the mathematical operations
used.
q) RSA is not only used for encryption but also for digital signatures. Explain the concept of digital
signatures and how RSA can be utilized to generate and verify digital signatures

Ques 2:

Perform encryption and decryption using the RSA algorithm, for the following:

a) p = 13 q = 17 e = 13 M = 15
b) p = 7 q = 13 e = 11 M = 89
c) p = 17 q = 53 e = 17 M = 287

Exponents e, d are inverses, and may be computed as: d = ( i *  (n) + 1 ) / e


Select initial value of i as 1, and then compute iteratively by incrementing i , until e divides the
numerator term evenly; i.e, you get an integer value, and not a fraction; this is the value of modular
inverse d.
Ques 3:

Suppose that two parties A and B wish to communicate securely using a Symmetric key encryption
algorithm, such as AES. They decide to set up a common Secret key between them using the Diffie
Hellman key exchange technique. They agree on 23 as the modulus (q) and 7 as primitive root (p).

(a) Choose suitable private values for A and B, and proceed according to DH key exchange algorithm
to establish a Secret key among them for communication. Give the value of the Secret key.
(b) Using the same values of p and q again, find another Secret key between A & B.

You might also like