Professional Documents
Culture Documents
Question Paper
COURSE : Network Security (CS G513) HD
Q. 1 Encrypt the plaintext “securityisimportant” using the Playfair cipher. Consider the
following secrete key for Playfair cipher to generate ciphertext. Show all steps of
calculating a ciphertext. 3M
L G D B A
Q M H E C
U R N I/J F
X V S O K
Z Y W T P
1
BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI, DUBAI CAMPUS
Question Paper
COURSE : Network Security (CS G513) HD
Q. 2 Consider a 3-round Feistel cipher with 8-bit plaintext with unknown round function. 3 M
You are given the following information:
i. E(1011 1100) = 1100 1011
ii. F(1100) = 0101
1
Q. 3 Assuming the output of the first application (round) of fK of S-DES is 00101011 and 4 M
K2 is 10111001, what is the output ciphertext? You may use the information below,
IP: 2 6 3 1 4 8 5 7
E/P: 4 1 2 3 2 3 4 1
P4: 2 4 3 1
IP-1: 4 1 3 5 7 2 8 6
Q. 4 If the key with party bits (64-bits) in DES is 0123 ABCD 2562 1456, find the first- 3 M
round key.
00 12 0𝐶 08
State1 = 04 04 00 23
12 12 13 19
14 00 11 19
3
BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI, DUBAI CAMPUS
Question Paper
COURSE : Network Security (CS G513) HD
Q. 2 What is firewall? Write in brief about three different types of firewalls with its 4M
advantages and disadvantages.