You are on page 1of 3

1.

Construct an Ellip c Curve over the Finite Field


Set of all Integers Mod 5.Consider the value for a
and b in the equa on to be 1. List the points on
the curve and demonstrate the following
a. Show the result of adding point P(2,1) with
point Q(3,4)
b. Show the result of adding point (2,4) with
itself

2. Assume a scenario of MiTM a ack, User Alice


& Bob exchange the key using Diffie Hellman alg.
Given the following informa on, α=3 q=23 XA=6
XB=10. John intrudes the communica on and
performs the Man in the Middle A ack with its
XC = 7. Generate the public keys for Alice, Bob
and John and find two shared secret keys
between Alice and John, another for John and
Bob.

3. Given a plain text “FLY”. Using SHA-512


algorithm, Derive the following informa on.
Consider the ASCII values for the plaintext F-70
L-76 Y-121
a) Find the length of padding bits.

b) Derive the sixteen 64 bit words (W0 to


W15) in hexa-decimal format.

c) Apply the majority func on of round


opera on on buffers A, B, and C.

d) Apply the condi on func on of round


opera on on buffers E, F, and G.
Consider the following values for the buffers.
A - 01100001
B - 01100010
C - 01100011
E - 01100101
F - 01100110
G - 01100111
Given a prime number q=19 and a=2. Let UserA
choose a private key XA =5, k=7, Using Elgamal
Digital Signature algorithm,
a. Generate the public key of UserA.
b. Generate a digital signature for the
plain text H(M)=17.
c. Verify the digital signature of UserA.

You might also like