0% found this document useful (0 votes)
177 views

Assignment CT 1

This document contains an assignment on cryptography techniques for a third year computer science course. It consists of 5 sets of questions covering topics like Playfair cipher, Hill cipher, AES, and number theory concepts like gcd and Euler's totient function. Students are required to encrypt/decrypt messages using different ciphers and perform algebraic operations in finite fields.

Uploaded by

Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views

Assignment CT 1

This document contains an assignment on cryptography techniques for a third year computer science course. It consists of 5 sets of questions covering topics like Playfair cipher, Hill cipher, AES, and number theory concepts like gcd and Euler's totient function. Students are required to encrypt/decrypt messages using different ciphers and perform algebraic operations in finite fields.

Uploaded by

Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Dept.

: CS
KPR Institute of Engineering and Technology
(Autonomous)
Avinashi Road, Arasur, Coimbatore - 641 407
Ac.Yr. : 2023 – 2024

Course Code & Title : U21CS601 CRYPTOGRAPHY TECHNIQUES


Year : III Semester : 06 Maximum Marks : 40

ASSIGNMENT II - SET I Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Construct a Playfair Square with keyword “cryptology”. Use this square
1 to encrypt the message: “The British Army used the Playfair Cipher 4 CO1
during World War One.”
Use Vernam Cipher perform encryption for Plain-Text: RAMSWARUPK
2 with Key: RANCHOBABA
2 CO1
Use the Vigenere cipher with keyword “HEALTH” to encipher the
3 message “Life is full of surprises.”
2 CO1
Encrypt the Message “Meet me” using the Hill cipher with the key
4 8 CO1
Show your Calculation and results.
Find the result of multiplying P1 = (x5 + x2 + x) by P2 = (x7 + x4 + x3 + x2
5 + x) in GF (28) with irreducible polynomial (x8 + x4 + x3 + x + 1). 8 CO2

Consider round key 1 in AES

6 8 CO2

Construct round key 2.

Use the Euclidean algorithm to find the greatest common divisor (gcd)
of the following pairs of numbers:
7 a = 96, b = 15, 4 CO3
a = 75 and b = 45

8 Find the value of φ(13). 4 CO3

ASSIGNMENT II - SET 2 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Encrypt "This is the final exam" with Playfair cipher using key
1 "Guidance". Explain the steps involved.
4 CO1
Use Vernam Cipher perform encryption: Input Message = HELLO, Key
2 = MONEY. 2 CO1

Page 1 of 6
Use a railfence cipher with 3 rails – removing the rails from top to
3 bottom – to encrypt the message alan turing the enigma. 2 CO1

Use a Hill cipher to encipher the message “We live in an insecure


world.” Use the following key
4 8 CO1

Determine the gcd of the following pairs of polynomials.


5 (x3 +x+1) and (x2 +1) over GF(3) 8 CO2
(x3 +1) and (x2 +x+1) over GF(2)
Consider
Plaintext: 00 04 12 14 12 04 12 00 0C 00 13 11 08 23 19 19 and
6 Cipher Key: 24 75 A2 B3 34 75 56 88 31 E2 12 00 13 AA 54 87 8 CO2
a. Show the original contents of State, displayed as a 4 * 4 matrix.
b. Show the pre-round key in AES.
Find the multiplicative inverse of 11 in Z26. Use the Extended Euclidean
7 algorithm.
4 CO3

8 Find the value of φ(10). 4 CO3

ASSIGNMENT II - SET 3 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Use Play fair cipher to encrypt the following message “This is a
1 columnar transposition.” Use key APPLE.
4 CO1
Using Vernam cipher method encrypt the word “HELLO”, use the
2 random numbers (23, 12, 2,10, 11).
2 CO1
Try decrypting this message that was encrypted by using a railfence
3 cipher with two rails. TEETN WRTRA HNWSE EOEBA TUSHR ISHBS 2 CO1
KONOO MCIEA DVLPD YRHRC EBU
Encrypt the message “time to study” using a Hill cipher with this key.

4 8 CO1

The Advanced Encryption Standard (AES) uses arithmetic in the finite


field GF (28) with the irreducible polynomial m(x) = X 8+X4+X3+X+1.
5 Consider the two polynomials f(x) = X6+X4+X2+X+1 and g(x) = X7+X+1. 8 CO2
Compute f(x) x G(x).

Answer the following questions about S-boxes in DES:


a. Show the result of passing 110111 through S-box 3.
6 b. Show the result of passing 001100 through S-box 4. 8 CO2
c. Show the result of passing 000000 through S-box 7.
d. Show the result of passing 111111 through S-box 2.

Use the Extended Euclidean algorithm find the modular multiplicative


7 inverse of number a = 27 under modulo b = 5. 4 CO3

8 Find the value of φ(240). 4 CO3

Page 2 of 6
ASSIGNMENT II - SET 4 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Use the Playfair cipher to encipher the message “The key is hidden
under the door pad”. The secret key can be made by filling the first and
1 part of the second row with the word “GUIDANCE” and filling the rest of 4 CO1
the matrix with the rest of the alphabet.

Decrypt the ciphertext “EQNVZ” with key numbers (23, 12, 2,10, 11)
2 using vernam cipher method. 2 CO1

The order of transcription of the columns is determined by the


alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
3 transcribed in order left-to-right. 2 CO1
Encrypt THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG if
the keyword is CORNELL

Using hill cipher encrypt the Plaintext: GFG using the Key:
4 HILLMAGIC. 8 CO1

Calculate the result of the following if the polynomials are over GF (2):
5 (x 4 + x 2 + x + 1) + (x 3 + 1) 8 CO2
(x 4 + x 2 + x + 1) × (x 3 + 1)

Given the plaintext {0F0E0D0C0B0A09080706050403020100} and the


key {02020202020202020202020202020202}:
a. Show the original contents of State, displayed as a 4 * 4 matrix.
6 b. Show the value of State after initial AddRoundKey. 8 CO2
c. Show the value of State after SubBytes.
d. Show the value of State after ShiftRows.
Use the Extended Euclidean algorithm. Let a = 7, m = 26. Find a −1 mod
7 m. 4 CO3

8 Using Fermat’s theorem find 1518 mod 17. 4 CO3

ASSIGNMENT II - SET 5 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Use Play fair cipher to encrypt the following message “COMSEC
1 means communications security. Use key Galois. 4 CO1

find the ciphertext for the following message “go at morning”, use
2 vigenère method, with key “chair”. 2 CO1

3 The order of transcription of the columns is determined by the 2 CO1

Page 3 of 6
alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
transcribed in order left-to-right. Encrypt the message WE ARE
DISCOVERED SAVE YOURSELF with key word AUTHOR

4 Using hill cipher encrypt plain text “COE” use key “ANOTHERBZ” 8 CO1
With polynomial coefficients drawn from GF (2), let us use the
irreducible polynomial x 3 + x + 1 to construct the finite field GF (2 3).
5 Now calculate 8 CO2
(x 2 + x + 1) + (x 2 + 1) =? and (x 2 + x + 1) × (x 2 + 1) =?

Given the plaintext {000102030405060708090A0B0C0D0E0F} and the


key {01010101010101010101010101010101},
a. Show the original contents of State, displayed as a 4 x 4
matrix.
6 8 CO2
b. Show the value of State after initial AddRoundKey.
c. Show the value of State after SubBytes.
d. Show the value of State after ShiftRows.
Using the Euclidean algorithm, find the greatest common divisor of the
following pairs of integers.
7 a. 24 and 320 4 CO3
b. 401 and 700

Using Fermat’s Little Theorem, Find the result of (i) 6 10 mod 11 (ii)
8 312mod 11.
4 CO3

ASSIGNMENT II - SET 6 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Consider the following plaintext: SHE WENT TO THE STORE. Encrypt
1 using Play fair cyber with the keyword “PROBLEMS”. 4 CO1

Find the message (plaintext) for the following ciphertext


2 “DMPYCQGCDWSXHIEI” use vigenère method, with key “LINE”. 2 CO1

The order of transcription of the columns is determined by the


alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
3 transcribed in order left-to-right. Encrypt the message "MEET ME AT 2 CO1
SEVEN PM IN GATES" (called the "plaintext") with the key
"COMPSCI"

4 Encrypt the Plaintext: ACT with Key: GYBNQKURP using Hill cipher. 8 CO1
Given the following two 3-bit binary code words from GF (2 3) with the
modulus polynomial x 3 + x + 1:
5 B1 = 1 1 1 8 CO2
B2 = 1 0 1
Now calculate: B1 + B2 =? and B1 × B2 =?

Page 4 of 6
Using the Euclidean algorithm, find the greatest common divisor of the
following pairs of integers.
6 a. 88 and 220 8 CO2
b. 300 and 42

7 Find the result of 624 mod 35 using Euler’s Theorem. 4 CO3


Consider the value of State after Shift Rows in AES encryption
scheme.

8 4 CO3

Show the value of State after MixColumns.

ASSIGNMENT II - SET 7 Deadline: 06/03/2024

Q.No. Answer All Questions Marks CO


Consider the Keyword: Gitam University and Plain Text: Gaming
1 academy. Encrypt using play fair cyber.
4 CO1
Use Vigenere Cipher, find cipher text with Key: mask, Plaintext:
2 meetmeatfield. 2 CO1

Using one time pad (Vernam) method, find message (plaintext) for the
3 following ciphertext “QTEZFCWNFGGGJ”, use key numbers (23, 75, 2 CO1
52, 64, 12, 82, 5, 31, 44, 90, 39, 28, 17).

Encrypt the plaintext “friday” using a 2*2 Hill cipher

4 8 CO1

Find the result of (x5 + x2 + x) ⊗ (x7 + x4 + x3 + x2 + x) in GF (28) with


5 irreducible polynomial (x8 + x4 + x3 + x + 1). Note that we use the 8 CO2
symbol ⊗ to show the multiplication of two polynomials.

Consider one-round version of DES encryption. Given the same bit


pattern for the key K and the plaintext, namely:
Hexadecimal notation: 0 1 2 3 4 5 6 7 8 9 A B C D E F
6 a. Derive K1, the first-round subkey. 8 CO2
b. Derive L0, R0.
c. Expand R0 to get E[R0], where E[ # ] is the expansion function.

Use the Euclidean algorithm to compute the GCD of A = 7469 and B =


7 2464 4 CO3

8 Find the result of 2062 mod 77 using Euler’s Theorem. 4 CO3

Page 5 of 6
Page 6 of 6

You might also like