Cryptography Assignment
Cryptography Assignment
Individual Assignment
2. List and briefly define categories of passive and active security attacks.
3. What is the difference between a monoalphabetic cipher and a
polyalphabetic cipher?
5. Explain how One-time pad works and describe the limitation of this
algorithm.
7. What are the parameters that determine the actual design of feistel
cipher algorithm and describe the effects of each parameter on the
algorithm.
11. Why should you include a message authentication code (MAC) with a
message? What is the difference between a MAC and an HMAC?
12. Hash functions are commonly used for checking message integrity. List
the four basic requirements of cryptographic hash functions
13. Describe which services can implemented and explain in detail how it
could be achieved for each of the following figures as shown below.
16. What is the use of digital signature? What are the requirements of a
digital Signature scheme? Explain what is meant by a digital signature
and describe how it is generated. Does a digital signature ensure the
entire message is encrypted? You should provide one reason to support
your answer?
20. How does the man in the middle attack work in Diffie–Hellman?