0% found this document useful (0 votes)
55 views4 pages

Cryptography Assignment

Uploaded by

mulugeta haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views4 pages

Cryptography Assignment

Uploaded by

mulugeta haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MEKELLE UNIVERSITY

MEKELLE INSTITUTE OF TECHNOLOGY

Department of Electronics and Communication Engineering

Cryptography and Network Security

Individual Assignment

Submission Date : 15/10/2023


1. The Open Systems Interconnection (OSI) security architecture provides a
systematic framework for defining security attacks, security mechanisms,
and security services. Define each of these terms and explain the
relationships among these categories.

2. List and briefly define categories of passive and active security attacks.
3. What is the difference between a monoalphabetic cipher and a
polyalphabetic cipher?

4. The best-known multiple-letter encryption cipher is the Playfair, which


treats diagrams in the plaintext as single units and translates these
units into ciphertext.
i) Construct a table for the Playfair Cipher with the keyword
”EFFECTIVENESS”
ii) Encrypt the phrase: “ELECTRONICS AND COMMUNICATION
ENGINEERING”
iii) Decrypt the sequence: “PQFVCKFUFBGMUFYSTIKZKAGWWG”

5. Explain how One-time pad works and describe the limitation of this
algorithm.

6. What is the difference between an unconditionally secure cipher and a


computationally secure cipher?

7. What are the parameters that determine the actual design of feistel
cipher algorithm and describe the effects of each parameter on the
algorithm.

8. What is the purpose of diffusion and confusion in the design of block


ciphers?

9. What is the purpose of S-boxes in DES?

10. Why was DES replaced by AES?

11. Why should you include a message authentication code (MAC) with a
message? What is the difference between a MAC and an HMAC?

12. Hash functions are commonly used for checking message integrity. List
the four basic requirements of cryptographic hash functions
13. Describe which services can implemented and explain in detail how it
could be achieved for each of the following figures as shown below.

14. What is meant by one-way property in hash function? What is weak


collision resistance? What is the use of it?

15. What are the types of attacks addressed by message authentication?

16. What is the use of digital signature? What are the requirements of a
digital Signature scheme? Explain what is meant by a digital signature
and describe how it is generated. Does a digital signature ensure the
entire message is encrypted? You should provide one reason to support
your answer?

17. What is an advantage of symmetric key cryptography over public key


cryptography and describe the limitations of symmetric key
cryptography?
18. What are the two important key issues addressed with public-key
cryptography?

19. What requirements must be a public-key cryptosystems fulfill to be a


secure algorithm.

20. How does the man in the middle attack work in Diffie–Hellman?

You might also like