Imprant Ne. Oncoepang yor ener comput ow dag sin on he wining Mak ae
5 Niymveing ef i pel
GEESISCHETE
TIT)
Cryptography
4
1scs744
snth Semester B.E. Degree Examination, July/August 2022
‘Max, Marks: 100
Using Hill Cipher technique, encrypt the plaintext “Paymoremoney” using the key
(ins
2118 21
2 2 19,
(Hint: a0 , b= 1, O\2...2= 25)
Explain the playa eihee and is rules forthe following example.
Keyword: MONARCHY; Pintext : Cryplograpy.
Define Substitution and Transposition techniques.
oR
Explain DES Ehoryption algorithm, with eat dagram.
“Explain Feistel encryption and Decryption algorithm, with neat digran.
‘Module-2
Explain Public Key Cryptosytens
"Explain the description ofthe RSA algorithm,
oR
Explain the Diffie — Hellnian key exchange algorithm.
Describe Eigamal Cryptographic systems
Explain Flite curve over rea! numbers
Deseribe Mil ~ Schnorr pseudorandom Bit generator with neat diagram.
oR
Expliin Key - disebution Seana, with eat diagram.
osstans)
oastarts
(oentarts)
aos)
ost
(oo mtans)
(ao mars)
cosas)
doses)
costars)
(aontaas)
conta)
Explain Public ~ key authority technique proposed forthe distribution of Public keys
Mouute-t
Deserts Publi Ke faster, wil net diagram.
Expin Remote User ~Autienteation Peis.
on
Describe in dil PGP (Pet Goo Piney) Cryptographic into
Exptin DKIM (Domain Ke ented Mat unto fw with diagram.
Modute-s
Deseret spliation an benef of Po -
Dose IP Seeuty Archizetare, wih et diagram, CIT L195
i anno
Explain Interpet Key Exchange (IKE) Key determination atures,
Expin Base Combinations of Sear Asocatons
‘Gostarss)
(ao stan)
(GoMars)
(costar)
(Gosek
(ao stark
(dostarksy
(ao tarts