You are on page 1of 1

Heritage Institute of Technology

Subject: Cryptography and Network Security

Code: INFO4243
Participating Dept: Information Technology (4th Year, 2nd Semester)

Session: 2019-2020

Assignment-I

Q1) Explain the encryption algorithm of RC5 with a neat sketch.

Q2) Explain the sub key generation algorithm of RC5 with a neat sketch.

Q3) What is Key shifting? Illustrate key shifting in IDEA sub key generation process up to 5 rounds.

Q4) Deduce the cipher text for the plain text “44, Hazra Avenue, kolkata-700029 using Playfair
substitution technique. Key to be used is “NETWORK SECURITRY’’.

Assignment-II

Q1) Explain HMAC algorithm in detail with a neat sketch.

Q2) Explain the attacks possible in (i) RSA algorithm and (ii) Packet filtering router.

Q3) What is Authentication token? Explain the working of Authentication token.

Q4) Differentiate between Strong, Weak and Random password.

Q5) Explain different types of Firewall configuration with neat sketches.

You might also like