How To Exam?

a knowledge trading engine...


Cochin University of Science and Techology (CUST) 2008-2nd Sem M.C.A , -university question paper

Tuesday, 28 May 2013 04:40Web



MCA.2/08.2(b)

MCA DEGREE II SEMESTER EXAMINATION, APRIL 2008

CAS 2202 NUMBER THEORY AND CRYPTOGRAPHY

Maximum marks: 50

Time: 3 Hours


PART A

(Answer ALL questions)

(All questions carry EQUAL marks)

(15 x 2 = 30)

I.    a.    State the Euclidean algorithm and its extension.

b.    Show that the number of primes is infinite.

c.    Find the number of divisors of 9504.

II.    a.    Find the least positive incongruent solutions of 36x = 27(mod 45).

b.    Ifp is prime, then show that 2 (/> - 3)!+1 is a multiple of p.

c.    Evaluate the Legendre symbol (221/399).

III.    a.    What do you mean by cryptanalysis? Why is cryptanalysis important?

b.    Differentiate between confusion and diffusion as applied to cryptosystems.

c.    Discuss the 4 important aspects of information security.

IV.    a.    Compare the security aspects of RS A and ECC cryptosystems.

b.    Write the Diflfie-Hellman protocol for key exchange.

c.    What are the schemes for commercial key distribution in symmetric and public key cryptography?

V.    a.    Write the desirable properties of hash functions.

b.    Compare the features of MD5 and SHA-1.

c.    What are the features of Kerberos?

PART B

(All questions carry EQUAL marks)

(5x4 = 20)

VI.    A. Using the fundamental principles, show that if a = b{modm) and c = c/(mod n), then (i)

ax + cy = bx + ify(mod m)    (ii) ac = M(mod m) and (iii) a" = b" (mod m), where

a, 6, c,d,m,ne Z*.

OR

B. State and prove the Eulers theorem. Deduce the Fermats little theorem from Eulers theorem.

VII.    A. Solve x = l(mod3), x e 2(mod 4), x = 3(mod 7) and x s 4(mod 11).

OR

B. Show that if gcd(a,m) = g and gib, then the congruence ax = 6(modm)has exactly g incongruent solutions, where a,b}g,m e Z+.

(Turn over)

(2)

VIII.    A. Discuss the different modes of block cipher operation. Which mode is the best? Justify your answer.

OR

B. Analyse the strength of DES using parameters such as SAC, BIC, confusion, diffusion, etc. Discuss the after effects of DES challenges.

IX.    A. Prove the RSA algorithm.

OR

B. How are key exchange and encryption/decryption done in elliptic curve cryptography?

X.    A. Write the digital signature algorithm describing the key generation, signature generation and

verification.

OR

B. Write the SHA-1 algorithm.

***



Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Cochin University of Science and Techology (CUST) 2008-2nd Sem M.C.A , -university question paper