Professional Documents
Culture Documents
Page|1
E C.T
P.T
&”202
”0
P.T= “your last name” & “1999”
E= play fair algorithm (6x6) with keyword= “security2211”
THE ANSWETR
------------------------------------------------------------------------------------------------------
Page|2
Question (2): ESSAY (9 points)
Note: you can use the text book uploaded in cortex and PPT to answer the essay questions:
A) In AES cipher, each round contains 4 transformation processes. Fill the following empty cells
in the following table:
1-………………………………………………... ………………………………………………...
2-………………………………………………... ………………………………………………...
Page|3
3-………………………………………………... ………………………………………………...
4-………………………………………………... ………………………………………………...
B) Discuss the chosen parameters and design features that Feistel structure symmetric block
cipher depends on. (Text book -Chapter 2).
THE ANSWETR
------------------------------------------------------------------------------------------------------
Page|4
C) Discuss the following substitution ciphers: Monoalphabetic, Play Fair, and Vigenère from the
security analysis view. Then sort them according the best security algorithm till the worst
one.
THE ANSWETR
------------------------------------------------------------------------------------------------------
Page|5
Page|6