This preview shows page 1. Sign up to view the full content.
Unformatted text preview: (e) What requirements must a public key cryptosystems fulfill to be a secure algorithm?  Q.2. Describe the advantages and disadvantages of symmetric and asymmetric key cryptography.  Q.3. What is the difference between link and end-to-end encryption?  Q.4. Alice meets Bob and says Rjjy rj ts ymj xfggfym. Bj bnqq inxhzxx ymj uqfs . If she is using Caesar Cipher, what does she want to convey?  Q.5. Given a plain text alphabet G, using the RSA algorithm and the values as E=3, D=11, and N=15, find out what this plain text alphabet encrypts to and verify that upon decryption it transforms back to G.  Q.6. What is the source of presence of the Weak-keys, Semi-Weak-keys and Possibly-Weak-keys in the DES? Is it possible to implement DES so that this problem could be effectively handled, if at all? Explain in detail.  ********* No. of Pages = 1 No. of Questions = 6...
View Full Document
This note was uploaded on 02/05/2012 for the course NETWORK SE SS ZG513 taught by Professor Raj during the Spring '11 term at Birla Institute of Technology & Science, Pilani - Hyderabad.
- Spring '11