Let us consider the 4 bit key set as {1100, 1010, 0000, 1111, 0101, 1001} and input text as {1011, 1110, 1011, 1000}. Now trace the first full round operation of IDEA algorithm.
What is message authentication code? List the operations of computing digest value in different passes of MD4. Describe about Needham-Schroeder protocol.
Why do we need discrete logarithms? Illustrate with an example. Consider a Diffie-Hellman scheme with a common prime p=13 between user A and user B. Suppose public key of A is 10 and public key of B is 8. Now determine their private keys and shared secret key. Select any valid primitive root of 13.
Attempt any Eight questions
[8x5=40]Show encryption of plaintext "ALGORITHM" using the key "PSEUDOCODE" using playfair cipher.
Discuss the working mechanism of the Kerberos protocol.
What is the use of firewall? How circuit level gateway differs from stateful inspection firewall?
What is intrusion? Explain any two types of intrusion detection system.
Find the multiplicative inverse of polynomial {x^5} using Extended Euclidean Algorithm.
What is DoS attack? Discuss about PKI trust model.
Using Vigenere cipher with key="worlds", encrypt the plain text "hello everyone".
Describe the different modes of block cipher encryption.
Write short notes on (any two)
a) Totient value of a positive integer.
b) Properties of hash function.
c) Virus Vs Worms.