Birthday attacks are often used to find collisions of

This preview shows page 18 - 21 out of 30 pages.

Birthday attacks are often used to find collisions of hash functions35.What is collision resistance? What is the use of it? [May/June- 2013]
PART B1. Discuss the discrete logarithm and explain Diffie-Hellman key Exchangealgorithm with its meritsand demerits.(16)[April/May 2011]2.(b)Explain about MD5 in detail. (16) [April/May 2011]3.(a) Illustrate about the SHA algorithm and explain. [Nov/Dec 2011]4. (b) Write a detailed note on Digital signatures. [Nov/Dec 2011]1.Explain Authentication Functions.Message EncryptionMACHash function2.Describe HMAC algorithm.AlgorithmDiagramNotes3.Describe RIPEMD-160.AlgorithmDiagramNotes4.Explain Hash Functions.Security featuresAlgorithms usedIllustration5.Explain Digital Signature Standard.AlgorithmDownload Useful Materials from Rejinpaul.com
AnalysisDiagram6. Apply the MAC on the cryptographic checksum method to authenticate build confidentialityof the message where the authentication is tied to messageM=8376, K1=4892, K2=53624071(Nov/Dec 2009)7. What are the properties a hash function must satisfy? (Nov/Dec 2009)Explanation6.Explain MD5 message digest algorithm, with its logic and compression function.(Nov/Dec 2009)AlgorithmExplanationDiagram7.Explain the secure hash algorithm. (April/May 2010)AlgorithmExplanationDiagram8.Describe the steps in MD5 algorithm. (April/May 2010)AlgorithmExplanationDiagram11. Explain the DiffieHellman key exchange using an example. (April/May 2010)AlgorithmIllustrationDiagram12. .Explain Elliptic Curve Architecture.ArchitectureAlgebraic descriptionGeometric description13. How does SHA-1 logic produce message digest? (May/June 2009)14.What is message authentication ?Explain. (May/June 2009)15. Write and explain the Digital Signature Algorithm.·Signature = (r,s)·Verify v = r’Download Useful Materials from Rejinpaul.com
·Algorithm·Block diagram16.Explain about hash algorithm (SHA) in detail. [May/June- 2013]17.Explain about Diffie Hellman Key exchange algorithm with one suitable example.[May/June- 2013] Explain Digital Signature Standard. [May/June- 2014]18.Briefly explain Diffie-Hellman Key Exchange. [May/June- 2014]

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 30 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
NoProfessor

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture