0% found this document useful (0 votes)
29 views

Unit 1

This document contains two units that discuss various cryptographic concepts and algorithms. Unit 1 discusses the differences between block and stream ciphers, types of attacks and cryptanalysis techniques. It also explains classical ciphers like Playfair, DES, Feistel networks and transposition ciphers. Unit 2 covers asymmetric key concepts like RSA and Diffie-Hellman key exchange along with examples of generating and using public/private keys to encrypt messages. It also discusses Elgamal encryption and decrypts a ciphertext using the recipient's private key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Unit 1

This document contains two units that discuss various cryptographic concepts and algorithms. Unit 1 discusses the differences between block and stream ciphers, types of attacks and cryptanalysis techniques. It also explains classical ciphers like Playfair, DES, Feistel networks and transposition ciphers. Unit 2 covers asymmetric key concepts like RSA and Diffie-Hellman key exchange along with examples of generating and using public/private keys to encrypt messages. It also discusses Elgamal encryption and decrypts a ciphertext using the recipient's private key.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Unit-1

1. Distinguish between Block and Stream cipher.


2. Differentiate between; i) Active and passive attacks ii) Data confidentiality and Data integrity iii)
Substitution and Transposition
3. Use the play fair cipher to encipher the message “Life is full of surprises”. The secret key can be
made by filling the first and part of the second row the word “GUIDANCE” and filling the rest of
the matrix with the rest of the alphabet. (Note: ignore the space in between words)
4. Explain the structure of DES in detail.
5. Explain structure of Feistel encryption and decryption with a neat diagram.
6. Encrypt the message “hello” with the key of (7, 2) using Affine cipher method. Also explain
Affine cipher in brief.
7. Explain Transposition cipher and solve the given problem using Transposition cipher “Begin
operation at Noon”.
8. Classify and explain security goals and attacks.
9. Discuss the security mechanism and services.
10. Classify Mono alphabetic and Poly alphabetic cipher.
11. List four kinds of Cryptanalysis attack and explain each.

12. Write the message in a rectangle, row by row and red the message off, column by column but
permute the order of the columns. The order of the columns then becomes the key to the
algorithm.
Key: 4312567
Plaintext: MEET ME AFTER SOME TIME BECAUSE BUSY.

13. Differentiate Confusion and Diffusion


14. Apply rail fence cipher to encrypt a message “MEET ME AFTER SOME TIME”
Unit-2

1. Generate public and private keys by using RSA cryptosystem. Given N = 77, e = 13, Encrypt the
message m = 5 using RSA algorithm. Decrypt the same.
2. Explain Diffie-Hellman key exchange algorithm / protocol in detail. And also Illustrate how this
protocol suffers Man-in-the-Middle attack?
3. Differentiate between conventional and public key cryptosystem.
4. In RSA system, given p = 3, q = 11, e = 7 and m = 5. Find the cipher text ‘C’ and also find message
‘m’ from decryption.
5. Discuss general idea of asymmetric key cryptosystem.
6. Explain the working of Diffie-Hellman key exchange algorithm. Compute Diffie-Hellman practical
key and secret key where a = 24, b = 27, g = 2, and p = 131.
7. Give a detailed note on Elgamal encryption. A block of plaintext message m = 3 has to be
encrypted. Assume p = 11, g = 2, recipients private key = 5. Sender chooses random integer r = 7,
perform encryption and decryption.

8.

9.

You might also like