Network Security Revison WorkSheet IL2
Network Security Revison WorkSheet IL2
Module 1
1. Encrypt the message “Meet me after the party” Using the Hill Cipher with Key
(9 4
5 7)
2. Explain DES Encryption algorithm with neat diagram
3. Explain Playfair Encryption Algorithm. Find the Ciphertext for plaintext =”instruments” with
key =”MONARCHY”
4. Explain the following:
Substitution and Transposition Techniques
Hill Cipher Encryption Algorithm
5. Explain Feistel Encryption and Decryption algorithm with neat diagram
6. Define the following terms:
Encryption
Decryption
Cryptography
Network Security
Symmetric & Asymmetric Encryption Techniques
7. Explain 4 steps in 1 round of Encryption Algorithm in DES with neat diagram
Module 2
8. Users Alice and Bob use Deffie-Hellman key exchange technique with a common prime
q=941 and primitive root a=627
If Alice selects her private key as 347, what is Alice’s public key?
If Bob selects his private key as 781, what is Bob’s public key?
What is shared secret key?
9. Using RSA Algorithm, perform encryption and decryption using p= 17, q =11, e= 7, M =88.
Calculate d & C ?
10. Explain Public Key Encryption using neat diagram
11. Explain Security of RSA from these attacks –
Brute Force Attack
Mathematical Attack
Timing Attack
Chosen Ciphertext Attack
12. Explain Deffie-Hellman Key Exchange Algorithm
13. Compare how Deffie-Hellman key Exchange algorithm useful in evaluating man-in-the-
middle attack cocnept
14. Describe Elgamal Cryptographic System
Module 3