0% found this document useful (0 votes)
32 views1 page

Assignment No-01-Css

This document contains an assignment with 6 questions covering various cryptography and cybersecurity topics. Question 1 asks to explain security goals and differentiate between active and passive attacks. Question 2 involves encrypting and decrypting a message using additive, multiplicative, and Vigenere ciphers. Question 3 asks to explain the DES function. Question 4 gives RSA problems to find the decryption key d given different values of the public key components n and e. Question 5 asks to explain the Kerberos protocol with a diagram. Finally, question 6 asks the difference between HMAC and CMAC. The assignment covers multiple learning outcomes and is due to the listed instructor.

Uploaded by

Atul Shintre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views1 page

Assignment No-01-Css

This document contains an assignment with 6 questions covering various cryptography and cybersecurity topics. Question 1 asks to explain security goals and differentiate between active and passive attacks. Question 2 involves encrypting and decrypting a message using additive, multiplicative, and Vigenere ciphers. Question 3 asks to explain the DES function. Question 4 gives RSA problems to find the decryption key d given different values of the public key components n and e. Question 5 asks to explain the Kerberos protocol with a diagram. Finally, question 6 asks the difference between HMAC and CMAC. The assignment covers multiple learning outcomes and is due to the listed instructor.

Uploaded by

Atul Shintre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ASSIGNMENT NO-01

Q No Question CO BL
1 CO1 BL2
Explain three security goals and differentiate between active attacks and passive attacks.

2 BL3
Encrypt the message “this is an exercise” using one of the following ciphers. Ignore CO1
the space between words. Decrypt the message to get the original plaintext.
a. Additive cipher with key = 20
b. Multiplicative cipher with key = 15 also
c. Use the Vigenere cipher with keyword “HEALTH” to encipher the message “Life is full of
surprises”.

3 CO2 BL2
Explain DES function.

4 In RSA: CO2 BL3


a. Given n = 221 and e = 5, find d.
b. Given n =3937 and e =17, find d.
c. Given p = 19, q = 23, and e = 3, find n, φ(n), and d.
5 CO2 BL2
Explain Kerberos protocol with the help of diagram

6 CO3 BL3
Distinguish between HMAC and CMAC

SUBJECT-CSS INCHARGE -Prof ATUL SHINTRE


DATE OF SUBMISSION:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy