0% found this document useful (0 votes)
22 views3 pages

Amb J

The document contains questions about cryptography concepts and algorithms. It asks the student to describe security services like confidentiality and integrity. It also asks the student to explain cryptanalysis techniques for ciphers like Playfair, Hill, and Vigenere. Questions are included on additive, multiplicative, and affine ciphers as well as cryptography fundamentals.

Uploaded by

killergirl8790
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views3 pages

Amb J

The document contains questions about cryptography concepts and algorithms. It asks the student to describe security services like confidentiality and integrity. It also asks the student to explain cryptanalysis techniques for ciphers like Playfair, Hill, and Vigenere. Questions are included on additive, multiplicative, and affine ciphers as well as cryptography fundamentals.

Uploaded by

killergirl8790
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography

Class Assignment - 1
Date: 13-10-2023

Q. 1 Describe in the brief following security services…


(a) Confidentiality.
(b) Traffic confidentiality.
(c) Access control.
(d) Data Integrity.
(e) Non-Repudiation.

Q. 2 What are the different security goals? Explain each of them.


Q. 3 Explain the different attacks, threatening to confidentiality, Integrity and
availability security goal.
Q. 4 Differentiate between Cryptography and Steganography.
Q. 5 What is cryptanalysis. Explain different cryptanalysis attacks can be applied
on ciphertext.
Q. 6 Explain Playfair Cipher algorithm. Solve by playfair. Plain text = “I am not in
the college”.

Q. 7 Do the cryptanalysis of Affine Cipher and try to decrypt following encrypted


data:
PWUFFOGWCHFDWIWEJOUUNJORSMDWRHVCMWJUPVCCG
Q. 8 Explain Vigenere Cipher. Encrypt the message “Life is full of surprises” using
the key “health” using vigenere cipher. Explain the cryptanalysis process of
Vigenere Cipher
Q. 9 Explain Autokey cipher. Use Autokey cipher to encrypt “Attack is today” using
key 12. Do the cryptanalysis of autokey cipher.
Q. 10 Explain Hill cipher approach for encryption. Explain the cryptanalysis process
of Hill Cipher. Use the Hill cipher to encipher the message “We live in an
insecure world”. Use the following key K= ( )
3 2
5 7
.

Q. 11 A small private club has only 100 members. Answer the following questions:
a. How many secret keys are needed if all members of the club need to send
secret messages to each other?
b. How many secret keys are needed if everyone trusts the president of the
club? If a member needs to send a message to another member, she first
sends it to the president; the president then sends the message to the other
member.
c. How many secret keys are needed if the president decides that the two
members who need to communicate should contact him first. The president
then creates a temporary key to be used between the two. The temporary key
is encrypted and sent to both members.

Q. 12 Alice often needs to encipher plaintext made of both letters (a to z) and digits
(0 to 9).
a. If she uses an additive cipher, what is the key domain? What is the
modulus?
b. If she uses a multiplication cipher, what is the key domain? What is the
modulus?
c. If she uses an affine cipher, what is the key domain? What is the modules?
Q. 13 Explain additive, multiplicative and affine cipher. Do the cryptanalysis of each
with example.
Q. 14 Encrypt the message “this is an exercise” using one of the following ciphers.
Ignore the space between words. Decrypt the message to get the original
plaintext.
a. Additive cipher with key = 20
b. Multiplicative cipher with key = 15
c. Affine cipher with key = (15, 20)

Short Questions –
1. Define Cookies.
2. Define masquerading attack.
3. Define Brute-Force Attack.
4. How can you find a decryption key, if the encryption key is given to you.
5. Define Steganography.
6. Differentiate active and passive attack.
7. What is symmetric key encryption algorithm?
8. Explain shared key.
9. Explain Kerckhoff’s Principle
10. Explain Brute-Force Attack
11. Explain Statistical Attack
12. Differentiate substitution and transposition ciphers.
13. Differentiate monoalphabetic and polyalphabetic ciphers.
14. Differentiate between block cipher and stream cipher.
15. Define Cyclic group.
16. Explain Lagrange’s Theorem
17. Define order of element.

You might also like