logo

Crowdly

Browser

Add to Chrome

CMP5385 Applied Cryptography A S1 2025/6

Looking for CMP5385 Applied Cryptography A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5385 Applied Cryptography A S1 2025/6 at moodle.bcu.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

For this question, show your full working out, line by line. Simply submitting a correct answer with no method marks will not give you full marks for the question.  

For public key parameters and , and Alice’s private key = 10 and Bob’s private key = 8.

Determine Alice’s public key:

View this question

What does this reveal about the ethical design of cryptographic systems?

View this question

Download the ciphertext linked to this question. Upload it as a file in OpenSSL on Cryptool Online. Using the 'Encrypt & Decrypt' tab, decrypt this file using the aes-256-ctr symmetrical cipher. Ensure the passphrase is cryptography and leave the Initialization Vector (IV) to be Automatic (PBKDF2). Ensure the options: Salt and Base64 are selected.

The ciphertext can be found by the quiz link on the Module Moodle homepage and the file name is "ciphertext_4.data".

NB: If you're unable to download the file, then open it and copy the contents into a blank text file. Save and use that.

Enter your answer here:

View this question

What fundamental flaw in textbook digital signatures does this reveal?

View this question

A software company uses textbook RSA digital signatures to secure its app updates. Here’s how it works:

  1. The developer has a public key ( and a private key
  2. To sign an update, the developer: 

    Computes a hash of the update file (e.g., ). 

    Creates a signature:
  3. Users download the update and verify it: 

    Compute (from the update file).
  4. Check if which is correct. 

An attacker replaces the developer’s public key with their own on the download page. When users download the same update: 

They compute (unchanged). 

They check which is incorrect (≠ 10). 

But the attacker provides a new signature signature' = 8 such that which matches the original hash. 

Why can a user be tricked into accepting the attacker’s update?

View this question

Propose one simple modification that would reduce this user burden, and explain why it balances security with usability in an academic setting.

View this question

Propose one simple modification that would prevent this attack. 

View this question

Apply the RSA algorithm (in Cryptool Online) to encrypt the following:  

Plaintext: your student number 

p = 6547

q = 9689

e: 11

Enter the ciphertext: 

Attach screenshots of the screen of the online tools or your working as part of your answer. 

View this question

For this question, show your full working out, line by line. Simply submitting a correct answer with no method marks will not give you full marks for the question.  

For public key parameters and , and Alice’s private key = 5 and Bob’s private key = 7.

Determine Alice’s public key:

View this question

Determine the shared secret. Show this from both Alice’s and Bob’s perspective, proving that the secret is the same for both. 

View this question

Want instant access to all verified answers on moodle.bcu.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome