You are on page 1of 1

Charotar University of Science and Engineering

Devang Patel Institute of Advance Technology and Research


Department of Computer Engineering / Computer Science & Engineering
Academic Year : 2019 – 2020 [6th Sem]

Information Security / Cryptography and Network Security


Assignment – 1
1. Define three security goals.
2. Give the relationship between security services and mechanisms.
3. Encrypt the message “this is an exercise” using following ciphers
A. Additive cipher with key = 20
B. Multiplicative cipher with key = 15
C. Affine cipher with key = (15,20)
D. Vigenere cipher with key = “dollars”
E. Autokey cipher with key = 7
F. Playfair with key = “dollars”
4. Use a hill cipher to encipher the message “we live in an insecure world”. Use
following key:
Key K= 03 02
05 07
5. Use a brute-force attack to decipher the following message enciphered by Alice using
additive cipher. Suppose that Alice always uses a key that is close to her birthday,
which is on 13th of the month.
C.T = NCJAEZRCLASJLYODEPRLYZRCLASJLCPEHZDTOPDZQLNZTY
6. Use chosen plaintext attack to decipher the following message. Assume that you
know it is an affine cipher and that the plaintext “ab” is enciphered to “GL”
C.T = XPALASXYFGFUKPXUSOGEUTKCDGFXANMGNVS
7. List and Explain components of modern block ciphers in detail.
8. Distinguish between diffusion and confusion.
9. Distinguish between synchronous and nonsynchronous stream cipher.
10. Explain feistel block cipher with proof.

You might also like