You are on page 1of 2
Imprant Ne. Oncoepang yor ener comput ow dag sin on he wining Mak ae 5 Niymveing ef i pel GEESISCHETE TIT) Cryptography 4 1scs744 snth Semester B.E. Degree Examination, July/August 2022 ‘Max, Marks: 100 Using Hill Cipher technique, encrypt the plaintext “Paymoremoney” using the key (ins 2118 21 2 2 19, (Hint: a0 , b= 1, O\2...2= 25) Explain the playa eihee and is rules forthe following example. Keyword: MONARCHY; Pintext : Cryplograpy. Define Substitution and Transposition techniques. oR Explain DES Ehoryption algorithm, with eat dagram. “Explain Feistel encryption and Decryption algorithm, with neat digran. ‘Module-2 Explain Public Key Cryptosytens "Explain the description ofthe RSA algorithm, oR Explain the Diffie — Hellnian key exchange algorithm. Describe Eigamal Cryptographic systems Explain Flite curve over rea! numbers Deseribe Mil ~ Schnorr pseudorandom Bit generator with neat diagram. oR Expliin Key - disebution Seana, with eat diagram. osstans) oastarts (oentarts) aos) ost (oo mtans) (ao mars) cosas) doses) costars) (aontaas) conta) Explain Public ~ key authority technique proposed forthe distribution of Public keys Mouute-t Deserts Publi Ke faster, wil net diagram. Expin Remote User ~Autienteation Peis. on Describe in dil PGP (Pet Goo Piney) Cryptographic into Exptin DKIM (Domain Ke ented Mat unto fw with diagram. Modute-s Deseret spliation an benef of Po - Dose IP Seeuty Archizetare, wih et diagram, CIT L195 i anno Explain Interpet Key Exchange (IKE) Key determination atures, Expin Base Combinations of Sear Asocatons ‘Gostarss) (ao stan) (GoMars) (costar) (Gosek (ao stark (dostarksy (ao tarts

You might also like