Describe the Fiestel Cipher structure. Given the key {28,7F,,15, 16, 28, AE, D2, A6, AB, F7, 97,66,01,02,03,04}, compute the first 4 byte of next key after first iteration, using the following S-Box in AES.
| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | A | B | C | D | E | F | |
| 0 | 63 | 7C | 77 | 7B | F2 | 6B | 6F | C5 | 30 | 01 | 67 | 2B | FE | D7 | AB | 76 |
Illustrate the man in middle attack in Diffie - Hellman key exchange protocol. Assume the prime number be 19 and 10 as its primitive root. Select 5 as private key and 4 as random integer. Find the cipher text of M = 2 using Elgamal crypto system.
List the properties of hash function. Describe the algorithm for SHA -1 .
Attempt any Eight questions
[8x5=40]Describe any three types of malicious logic.
Given the key "HELLOWORLD", encrypt the plaintext "TURINGTEST" using Play fair cipher.
Explain any two modes of block cipher encryption.
State Fermat's theorem with example. What is the implication of discrete logarithm?
Describe the working mechanism of digital signature algorithm.
List and explain the types of firewall.
Decrypt the ciphetext "HI" using Hill Cipher where the key is
| 5 | 3 |
| 4 | 1 |
What is digital certificate? Discuss the certificate life cycle.
Define authentication system. Discuss about challenge response system.