CSC 4209 Cryptology and Coding Theory
CSC 4209 Cryptology and Coding Theory
PAUL’S UNIVERSITY
S
UN
P A U L ’
Private Bag 00217 Limuru, 00217, KENYA
I VE R S I TY
Tel: 020-2020505/2020510/0728-669000/0736-424440
.
S T
SE R TY
VANT
S OF GO D AND HUMANI
a) Describe four reasons why it would be necessary to encrypt the message. (4 Marks)
b) In a non-secure channel, mention four things that Eavesdropper could possibly do (4 Marks)
(4 Marks)
Page 1 of 4
SECTION B (answer ANY TWO. Each question carries 20 Marks)
Question Two
a) Show the steps followed in determining the parity bits of a hamming code (4 Marks)
b) Use hamming codes to detect and correct the error of a codeword sent as 111001101 and then received
as 110001101. (8 Marks)
c) Give the steps followed in order to generate secure RSA keys, hence generate and RSA key given two
primes: p=11 and q=13 (8 Marks)
Question Three
a) Given the plaintext X=110011000101 and a master key K=111001001, use the substitution boxes below to
perform one round encryption of X for the given Feistel system.
S-BOX 1 S-BOX 2
010 100 000 101 001 110 011 111 111 010 001 101 100 000 110 011
101 011 110 001 000 100 111 010 000 110 011 111 010 101 100 001
(5 Marks)
b) Given the key “YOTUI”, use the Playfair technique to Decrypt the ciphertext
IYOELRELYVBZIPSDROLHRBFAVM. (5 Marks)
c) Describe the Data Encryption Standard DES. (6 Marks)
You receive the Cipher text shown below from a friend;
GABMAWCNGQRQAYT
Required:
Assuming you have the same Key as in (b) above, use the Vigenere table below to produce the
Plaintext.
Page 2 of 4
(4 Marks)
Question Four
a) Find the fixed-length codes and prefix-free codes that use the least space if it is needed to store
messages made up of 4 characters a, b, c, d with frequencies 60, 5, 30, 5 (percent) respectively.
(4 Marks)
b) The string below is to be sent over a network.
BCAADDDCCACACAC
Use it to describe how Huffman code compression works. (Use a table to summarize your results)
(8 Marks)
c) Given that some plain text was encrypted with the formula y=E(x)=(5x+8)(mod 26), Decrypt the
cipher text WIQVAZILAVC (8 Marks)
Question Five
a) With Justification, give the key space for an affine cipher. (2 Marks)
b) Distinguish between Public (asymmetric) key cryptosystem and Private (symmetric) key
cryptosystem. (4 Marks)
c) Define Fermat's primality test and use your definition to check if the integer 15 is prime.
(4 Marks)
Page 3 of 4
d) Differentiate between Differential and Linear cryptanalysis (4 Marks)
e) Describe any SIX features of an Advanced Encryption System (6 Marks)
Page 4 of 4