Looking for CMP5385 Applied Cryptography A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5385 Applied Cryptography A S1 2025/6 at moodle.bcu.ac.uk.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Determine the shared secret. Show this from both Alice’s and Bob’s perspective, proving that the secret is the same for both.
For this question, show your full working out, line by line. Simply submitting a correct answer with no method marks will not give you full marks for the question.
For public key parameters and , and Alice’s private key = 5 and Bob’s private key = 7.
Determine Bob's public key:
What is the Diffie-Hellman key exchange used for?
A campus messaging app uses Diffie-Hellman key exchange for students to share notes. Here’s how it works:
An attacker intercepts and , impersonates Bob to Alice, and sends fake exam answers (e.g., "The answer to Q3 is 42"). Alice trusts the message because she thinks it’s from Bob.
How does this scenario shift responsibility for security from the app developers to the users?
Using OpenSSL (via Cryptool online) select the ‘Hashes’ tab. Under input, enter your name and hash it using sha256. Now hash the same input using the ‘blake2b512’ hash function and again using the ‘md160’ hash function.
What do you notice about the hashes that are being computed for the same input? What impact might this have when these different hashes are used in real-life scenarios?
Using https://www.cryptool.org/en/cto/rsa-step-by-step/ solve the following question and ensure you upload up to 3 screenshots for your answer. (in your Part B assessmnet, a correct answer without screenshots will not get full marks).
Using p = 33461 and q = 65837, find a suitable e and encrypt the message 1987654321.
For the last step on the cryptool page, decrypt your ciphertext and confirm you get the plaintext. Enter your value of e and your ciphertext in the response box as well as screenshots of your cryptool page.
Using analogies rather than mathematics, prepare an introduction to cryptography that you could present to teenaged schoolchildren, explaining the difference between symmetric and public-key encryption, and how these are combined to create a secure channel.
Define "Computational security".
A system encrypts data by splitting it into 128-bit blocks and applying a complex mathematical transformation (including substitution and permutation) to each block independently.
What type of cipher is this?
Many sites alert users of suspicious logins with encrypted notifications.
Which goal is being maintained?