You are on page 1of 1

Assignment of Unit-4

1. Differentiate between symmetric Key cryptography and public key cryptography.


2. What are the principle elements of a public key cryptosystem.
3. With the help of appropriate figure, explain how the public key cryptography should be
used when
 Providing only confidentiality
 Providing only sender authentication
 Providing both confidentiality and authentication
4. Write out the RSA algorithm.
5. Perform the encryption and decryption using the RSA algorithm for the following
 p=3, q=11, e=7, M=5
 p=11, q= 13, e = 11, M=7
6. What are two different uses of public-key cryptography related to key distribution?
7. Briefly explain Diffie-Hellman key exchange.
8. Describe the Man-in-the-middle attack on Diffie-Hellman Key Exchange.

9. User A and B use the Diffie-Hellman key exchange technique with common prime q = 71
and a primitive root α = 7.
a) If user A has private key XA = 5 ,
what is A’s pubic key YA ?

b) If user B has private key XB = 12 ,


what is B’s pubic key YB ?

c) What is the shared secret key?

10. Explain Elliptic curve cryptography.

You might also like