0% found this document useful (0 votes)
2 views1 page

CSS Assignment No-1

This document outlines an assignment for the Department of Computer Engineering at Bharat Engineering College for the academic year 2024-25, focusing on Cryptography and System Security. It includes various topics such as security goals, types of attacks on encrypted messages, cipher examples, digital signatures, and message authentication techniques. The assignment consists of 14 questions that require detailed explanations and examples related to cryptography concepts.

Uploaded by

yoceban962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views1 page

CSS Assignment No-1

This document outlines an assignment for the Department of Computer Engineering at Bharat Engineering College for the academic year 2024-25, focusing on Cryptography and System Security. It includes various topics such as security goals, types of attacks on encrypted messages, cipher examples, digital signatures, and message authentication techniques. The assignment consists of 14 questions that require detailed explanations and examples related to cryptography concepts.

Uploaded by

yoceban962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ESTD–(2010) DTECODE:EN3351

Add:Opp.GajananMaharajTemple,Kanhor,Badlapur(W),Tal:Ambernath,Dist:Thane421503,Mumbai

Web:bharatenggcollege.com
InnovativeEngineers’andTeachers’EducationSociety’s
Email:[email protected] Phone:7666615915

ApprovedbyAICTE,DTE&AffiliatedtoUniversityofMumbai,NAACAccredited

DEPARTMENT OF COMPUTER ENGINEERING


ACADAMIC YEAR-2024-25
Sub: Cryptography & System Security class/ sem: TE / VI

Assignment 01
1. Define the goals of Security?
2. List & Explain various types of Attacks on encrypted message.
3. Discuss any one Substitution Cipher with example. List their merits & demerits.
4. Encrypt the string “The Key is hidden under the door” with Play fair cipher using
the keyword “domestic”.
5. Discuss types of Transposition Cipher with example. List their merits & demerits.
6. What is the Purpose of S-boxes in DES? Explain the avalanche effect?
7. Explain Block cipher modes of operation in detail.
8. Explain “Diffie-Hellmen” key exchange algorithm with example. Also explain the problem of
MIM attack in it.
9. Why are digital certificates and signatures required? What is the role of digital signature in
digital certificates? Explain any one digital signature algorithm.
10. Discuss various attacks on Digital Signature.
11. What characteristics are needed in secure hash function? Explain secure hash function on 512
bit.
12. Provide comparison between HMAC, CBC-MAC and C-MAC.
13. Differentiate between SHA-1 and MD5.
14. What is need for message authentication? List various techniques used for message
authentication. Explain any one.

You might also like