Professional Documents
Culture Documents
Q. 1
The following questions are based on the scenario in which encrypted data are
passed
Between Alice & Bob using the RSA algorithm. Alices public key is {17,321},
{17,23} and Bobs public key is {5, 321}, {5,23}. Assume that no one knows the
private keys but the original users.
a) Encrypt the message M = 7 using Bobs public key.
b) Encrypt the message M = 7 using Alices public key.
c) What should Alice have to do to decrypt the message from part a) ?
d) What should Bob have to do to decrypt the message from part a) ?
e) What is Alices private key?
f) What is Bobs private key?
Q. 2
Q. 3
Use the Playfair cipher to encipher the message, attack cancelled on Monday. Wait
for next message. The secret key can be made by filling the first and the part of the
second row of a matrix with the word MORNING. Filling of rest of the matrix
can be done with the remaining alphabets. Consider Y and Z together in one cell
of the matrix
Q. 4
Q. 5
In an RSA system the public key (e,n) of user A is defined as (7,119). Calculate
(n) and private key d. What is the ciphertext when you encrypt the message m =
10, using the public key?
Q. 6
Encrypt The key is hidden under the door using Playfair cipher with keyword
domestic.
Q. 7
b) p = 7, q = 11, e = 17, M = 25
c) Find the corresponding ds for i) & ii) and decrypt the ciphertexts.
Q. 8
For the given values p = 19, q = 23 and e = 3 find n, (n) and d using RSA
algorithm.
Q. 9
A and B decides to use D-H key exchange where p = 13/ 23, g = 2 / 5. Each choose
his own secret nos. 6 and 11/ 15.
a) What is common secret key ?
b) What are their secret nos. ?
c) Can intruder M, gain any knowledge from protocol run if he sees p, g and
the 2 public keys 6 & 11/ 15. If yes show how?