0% found this document useful (0 votes)
42 views2 pages

CNS Assignment 1 2024

Uploaded by

heathcliff5792
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

CNS Assignment 1 2024

Uploaded by

heathcliff5792
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CNS Assignment– 1

Q.1. Briefly explain the two terms: Information security and Network security.
Q.2. Explain the key objectives associated with computer security.

Q.3. As a security designer list out the challenges to be handled to maintain computer security.

Q.4. Explain the following terms in the context of cryptography.


(i) Cryptosystem (ii) Cryptanalysis (iii) Cryptology
Q.5. State the difference between substitution and transposition technique of ciphering with suitable
examples.
Q.6. Differentiate between Monoalphabetic and Polyalphabetic ciphering.
Q.7. With suitable diagram explain the Symmetric encryption model.
Q.8.Decrypt the message “wigyvmxc rixiv gsqiw jsv jvii” using caeser cipher with key = 4. Mention
why the caeser ciphering technique is prone to brute force attack.
Q9. The ciphertext using Caesar cipher is C = PHHW PH DIWHU WKH WRJD SDUWB. Determine
the key value „K‟ and plaintext „P‟ using Brute force cryptanalysis.
Q.10. Assume a particular language has unique 46 alphabets. Specify the maximum number of brute-
force attempts required to determine the key for caeser cipher.
Q.11. Decrypt TGLDUCH HOTL LSUOLS AGC QRHKSHG, which was formed using a simple
monoalphabetic substitution cipher withthe keyword APPALACHIAN STATE.
Q.12. Consider a Playfair cipher with keyword “SECRET”. Decrypt “ENNGOHWSTEMEZY”,
which was formed using this cipher (assuming j is combined with i)?
3 10 20
Q.13. Encrypt the plaintext cipher using the Hill cipher for the key value 20 9 17 .
9 4 17
2 3
Q.14. Determine the inverse mod 26 of .
13 7
21 13 25
Q.15. Calculate the determinant mod 26 of 5 7 18 .
3 14 12
10 9
Q.16. Decrypt the ciphertext VZFJ using the Hill cipher for the key value
1 3
Q.17. Differentiate between Vigenere and Vernam cipher.
Q.18. Use key “network” and encrypt “This is a book on security” using Vigenere cipher.
Q.19. What would be the transformation of a message „Happy birthday to you‟ using rail-fence
technique of depth (i) 3 (ii) 4.
Q.20. Consider the Ciphertext “BTLNE SWOMY EOGEU CITAT ODABT UHR”. Using the Rail
Fence Cipher, find out the plaintext for key value 2.
Q.21. Consider a columnar transposition cipher with the keyword MAYBERRY. Use this cipher to
encrypt THE ANDY GRIFFITH SHOW WAS SET INRURAL MAYBERRY NORTH CAROLINA,
padded with Xs (if necessary) so each column in the array will have the same number of letters.
Q.22. Decrypt a cipher text “TTNAAPTMTSUOAODWCOIXPETZKNLY” using a columnar
transposition cipher of one round with a key 4312576.
Q23. Draw the Fiestel cipher structure that uses only three rounds of processing to generate the
ciphertext.

Q24. Using the structure mentioned in Q23 generate the ciphertext (in Hexadecimal form) for the 16
bits plaintext “9AC8” (in Hexadecimal form). Assume the round function as logic AND operation and
the subkeys for round 1, 2, 3 are “34”, “56”, “13” (in Hexadecimal form) respectively.

Q25. State how the inverse initial permutation table is created from initial permutation table.

Q26. In DES
Plaintext = P= 3478AB12405123CB (in Hexadecimal form)
Key = 5123CB3478AB1240 (in Hexadecimal form)
i) Derive K1, the first round sub key.
ii) Calculate first round or first stage output.

Q27. In DES, the 16th round 64 bit output is 123CB3478AB12405 (in Hexadecimal form). Calculate
the 64 bit ciphertext of DES.

You might also like