1. Differentiate between symmetric Key cryptography and public key cryptography.
2. What are the principle elements of a public key cryptosystem. 3. With the help of appropriate figure, explain how the public key cryptography should be used when Providing only confidentiality Providing only sender authentication Providing both confidentiality and authentication 4. Write out the RSA algorithm. 5. Perform the encryption and decryption using the RSA algorithm for the following p=3, q=11, e=7, M=5 p=11, q= 13, e = 11, M=7 6. What are two different uses of public-key cryptography related to key distribution? 7. Briefly explain Diffie-Hellman key exchange. 8. Describe the Man-in-the-middle attack on Diffie-Hellman Key Exchange.
9. User A and B use the Diffie-Hellman key exchange technique with common prime q = 71 and a primitive root α = 7. a) If user A has private key XA = 5 , what is A’s pubic key YA ?