0% found this document useful (0 votes)
80 views2 pages

CNS Assignment - I DBATU

The document contains instructions for a cryptography and network security assignment. It includes tasks such as explaining security services and attacks, implementing encryption algorithms like monoalphabetic cipher, Playfair cipher, transposition cipher, Hill cipher, and DES, calculating greatest common divisors and modular inverses, analyzing AES, RSA, and other public key cryptography concepts. Students are asked to encrypt and decrypt messages using various ciphers, expand DES keys, explain terms like avalanche effect and linear cryptanalysis, and solve problems related to RSA public key encryption.

Uploaded by

Tere Wadil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views2 pages

CNS Assignment - I DBATU

The document contains instructions for a cryptography and network security assignment. It includes tasks such as explaining security services and attacks, implementing encryption algorithms like monoalphabetic cipher, Playfair cipher, transposition cipher, Hill cipher, and DES, calculating greatest common divisors and modular inverses, analyzing AES, RSA, and other public key cryptography concepts. Students are asked to encrypt and decrypt messages using various ciphers, expand DES keys, explain terms like avalanche effect and linear cryptanalysis, and solve problems related to RSA public key encryption.

Uploaded by

Tere Wadil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

ASSIGNMENT – I

CLASS: B.E.(C.S.E) – I & II SUB: CRYPTOGRAPHY & NETWORK SECURITY

1.
a) List and explain X.800 security services.
b) Explain different types of security attacks with suitable diagrams.
c) Describe the model for network security and network access control.
2. Encrypt and Decrypt the message “ASSIGNMENT” using monoalphabetic cipher. Where key is
“LMIPBQVZKRGYXAENWFHCJODSLT”.

3. What is one time pad? What are the difficulties to implement it?

4.
a) Encrypt and decrypt the message “DATACONFIDENTIALITY ” using Playfair cipher. Where the key
is “PLAYFAIR”.

b) Encrypt and decrypt the message “COMPUTER NETWORK” using transposition cipher. Where the
key is 42531.

c) Encrypt and decrypt the message “GOOD MORNING” using Hill cipher. Where the key is

5.
a) Using Euclidean algorithm determine: i) gcd ( 36939 , 15246) ii) gcd ( 5264 , 15472)
b) Using extended Euclidean algorithm, find the multiplicative inverse of:
i) 5678 mod 8765 ii) 5994 mod 20736 iii) 826 mod 2789

c) Show that {Z7, +7 , x7 } with arithmetic operations modulo 7 is a field.


6.
a) Explain general processing of DES algorithm with suitable diagram.
b) Describe single round of DES in detail.
7.
a) List and explain different block cipher modes of operation.
b) Describe “meet-in-the-middle attack” in triple DES.
8. In DES:
a) Expand the key “2A4F01B673D4510C” into 4 subkeys of 48 bit using PC-1 and PC-2.
b) Show the output ciphertext after one round using key generated in above example for the
plaintext “CAE123AFBCD4562A”

9. Explain the following terms with respect to DES


a) Avalanche effect
b) Differential cryptanalysis
c) Linear cryptanalysis
d) Strength of DES.
10.
a) Describe the general structure of AES algorithm with suitable diagram.
b) Explain different transformation functions used in AES.
c) Describe the AES key expansion in detail.
11. In AES , generate first and second round keys from K= “CAE123AFBCD4562ACAE123AFBCD4562A”
12. Describe each of the following with suitable examples:
a) Fermat’s theorem
b) Euler’s theorem
c) Primitive roots
13.
a) Describe principles of public key cryptography with suitable diagrams.
b) Explain working of RSA algorithm with suitable example.
14. Using RSA algorithm Solve the following:
a) In a public-key system using RSA, you intercepted the cipher text C=8 sent to a user
whose public key is e=13, n=33. What is the plaintext M?
b) In a RSA system, the public key of a given user is e=37, n=5183. What is the private key of this
user?

You might also like