0% found this document useful (0 votes)
4 views2 pages

Network Security Revison WorkSheet IL2

The document is a revision worksheet for Network Security and Cryptography, covering various encryption algorithms including Hill Cipher, DES, Playfair, and RSA. It includes practical exercises on key exchange techniques like Diffie-Hellman, as well as theoretical explanations of key concepts such as encryption, decryption, and security attacks. Additionally, it discusses key distribution scenarios and the role of Key Distribution Centers (KDC) in encryption systems.

Uploaded by

S Suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Network Security Revison WorkSheet IL2

The document is a revision worksheet for Network Security and Cryptography, covering various encryption algorithms including Hill Cipher, DES, Playfair, and RSA. It includes practical exercises on key exchange techniques like Diffie-Hellman, as well as theoretical explanations of key concepts such as encryption, decryption, and security attacks. Additionally, it discusses key distribution scenarios and the role of Key Distribution Centers (KDC) in encryption systems.

Uploaded by

S Suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Network Security & Cryptography Revision Worksheet

Module 1

1. Encrypt the message “Meet me after the party” Using the Hill Cipher with Key
(9 4
5 7)
2. Explain DES Encryption algorithm with neat diagram
3. Explain Playfair Encryption Algorithm. Find the Ciphertext for plaintext =”instruments” with
key =”MONARCHY”
4. Explain the following:
Substitution and Transposition Techniques
Hill Cipher Encryption Algorithm
5. Explain Feistel Encryption and Decryption algorithm with neat diagram
6. Define the following terms:
Encryption
Decryption
Cryptography
Network Security
Symmetric & Asymmetric Encryption Techniques
7. Explain 4 steps in 1 round of Encryption Algorithm in DES with neat diagram

Module 2

8. Users Alice and Bob use Deffie-Hellman key exchange technique with a common prime
q=941 and primitive root a=627
If Alice selects her private key as 347, what is Alice’s public key?
If Bob selects his private key as 781, what is Bob’s public key?
What is shared secret key?
9. Using RSA Algorithm, perform encryption and decryption using p= 17, q =11, e= 7, M =88.
Calculate d & C ?
10. Explain Public Key Encryption using neat diagram
11. Explain Security of RSA from these attacks –
Brute Force Attack
Mathematical Attack
Timing Attack
Chosen Ciphertext Attack
12. Explain Deffie-Hellman Key Exchange Algorithm
13. Compare how Deffie-Hellman key Exchange algorithm useful in evaluating man-in-the-
middle attack cocnept
14. Describe Elgamal Cryptographic System

Module 3

1. Explain Man-in-the-middle attack with neat diagram


2. Explain Key Distribution scenario with neat diagram
3. Explain Key Distribution with confidentiality and authentication
4. What is the KDC (Key Distribution Center) and how it is useful in real world key distribution
between node level encryption and application level encryption

You might also like