You are on page 1of 2

ASSIGNMENT – I

CLASS: B.E.(C.S.E) – I & II SUB: CRYPTOGRAPHY & NETWORK SECURITY

1.
a) List and explain X.800 security services.
b) Explain different types of security attacks with suitable diagrams.
c) Describe the model for network security and network access control.
2. Encrypt and Decrypt the message “ASSIGNMENT” using monoalphabetic cipher. Where key is
“LMIPBQVZKRGYXAENWFHCJODSLT”.

3. What is one time pad? What are the difficulties to implement it?

4.
a) Encrypt and decrypt the message “DATACONFIDENTIALITY ” using Playfair cipher. Where the key
is “PLAYFAIR”.

b) Encrypt and decrypt the message “COMPUTER NETWORK” using transposition cipher. Where the
key is 42531.

c) Encrypt and decrypt the message “GOOD MORNING” using Hill cipher. Where the key is

5.
a) Using Euclidean algorithm determine: i) gcd ( 36939 , 15246) ii) gcd ( 5264 , 15472)
b) Using extended Euclidean algorithm, find the multiplicative inverse of:
i) 5678 mod 8765 ii) 5994 mod 20736 iii) 826 mod 2789

c) Show that {Z7, +7 , x7 } with arithmetic operations modulo 7 is a field.


6.
a) Explain general processing of DES algorithm with suitable diagram.
b) Describe single round of DES in detail.
7.
a) List and explain different block cipher modes of operation.
b) Describe “meet-in-the-middle attack” in triple DES.
8. In DES:
a) Expand the key “2A4F01B673D4510C” into 4 subkeys of 48 bit using PC-1 and PC-2.
b) Show the output ciphertext after one round using key generated in above example for the
plaintext “CAE123AFBCD4562A”

9. Explain the following terms with respect to DES


a) Avalanche effect
b) Differential cryptanalysis
c) Linear cryptanalysis
d) Strength of DES.
10.
a) Describe the general structure of AES algorithm with suitable diagram.
b) Explain different transformation functions used in AES.
c) Describe the AES key expansion in detail.
11. In AES , generate first and second round keys from K= “CAE123AFBCD4562ACAE123AFBCD4562A”
12. Describe each of the following with suitable examples:
a) Fermat’s theorem
b) Euler’s theorem
c) Primitive roots
13.
a) Describe principles of public key cryptography with suitable diagrams.
b) Explain working of RSA algorithm with suitable example.
14. Using RSA algorithm Solve the following:
a) In a public-key system using RSA, you intercepted the cipher text C=8 sent to a user
whose public key is e=13, n=33. What is the plaintext M?
b) In a RSA system, the public key of a given user is e=37, n=5183. What is the private key of this
user?

You might also like