CNSSQ Assignment
CNSSQ Assignment
1. Briefly explain the two terms: Information security and Network security.
2. Explain the key objectives associated with computer security.
3. As a security designer list out the challenges to be handled to maintain computer security.
4. Explain the following terms in the context of cryptography.
(i) Cryptosystem (ii) Cryptanalysis (iii) Cryptology
5. State the difference between substitution and transposition technique of ciphering with suitable
examples.
6. Differentiate between Monoalphabetic and Polyalphabetic ciphering.
7. With suitable diagram explain the Symmetric encryption model.
8. Decrypt the message “wigyvmxc rixiv gsqiw jsv jvii” using caeser cipher with key = 4. Mention
why the caeser ciphering technique is prone to brute force attack.
9. Encrypt the message “knowledge is power” using mono alphabetic cipher. Using the keyword
“Kryptos”.
10. Encrypt the following using the play fair cipher using the keyword MONARCHY. “SWARAJ IS
MY BIRTH RIGHT”. Use X for blank spaces.
11. Define the following terms:
(I) Cryptography (II) Cryptanalysis (III) Brut force attack (IV) Computer security (V) Network
security
12. The ciphertext using Caesar cipher is C = PHHW PH DIWHU WKH WRJD SDUWB. Determine
the key value „K‟ and plaintext „P‟ using Brute force cryptanalysis.
13. Assume a particular language has unique 46 alphabets. Specify the maximum number of brute-
force attempts required to determine the key for caeser cipher.
14. Decrypt TGLDUCH HOTL LSUOLS AGC QRHKSHG, which was formed using a simple
monoalphabetic substitution cipher with the keyword APPALACHIAN STATE.
15. Consider a Playfair cipher with keyword “SECRET”. Decrypt “ENNGOHWSTEMEZY”, which
was formed using this cipher (assuming j is combined with i)?
3 10 20
16. Encrypt the plaintext cipher using the Hill cipher for the key value (20 9 17).
9 4 17
2 3
17. Determine the inverse mod 26 of ( ).
13 7
21 13 25
18. Calculate the determinant mod 26 of ( 5 7 18).
3 14 12
10 9
19. Decrypt the ciphertext VZFJ using the Hill cipher for the key value ( ).
1 2
9 4
20. Convert “ALL THE BEST” using Hill cipher with the key matrix ( ).
5 7
21. Differentiate between Vigenere and Vernam cipher.
22. Use key “network” and encrypt “This is a book on security” using Vigenere cipher.
23. What would be the transformation of a message „Happy birthday to you‟ using rail-fence
technique of depth (i) 3 (ii) 4.
24. Consider the Ciphertext “BTLNE SWOMY EOGEU CITAT ODABT UHR”. Using the Rail
Fence Cipher, find out the plaintext for key value 2.
25. Consider a columnar transposition cipher with the keyword MAYBERRY. Use this cipher to
encrypt THE ANDY GRIFFITH SHOW WAS SET INRURAL MAYBERRY NORTH
CAROLINA, padded with Xs (if necessary) so each column in the array will have the same
number of letters.
26. Decrypt a cipher text “TTNAAPTMTSUOAODWCOIXPETZKNLY” using a columnar
transposition cipher of one round with a key 4312576.
27. Draw the Fiestel cipher structure that uses only three rounds of processing to generate the
ciphertext.
28. Using the structure mentioned in Q23 generate the ciphertext (in Hexadecimal form) for the 16
bits plaintext “9AC8” (in Hexadecimal form). Assume the round function as logic AND
operation and the subkeys for round 1, 2, 3 are “34”, “56”, “13” (in Hexadecimal form)
respectively.
29. State how the inverse initial permutation table is created from initial permutation table.
30. In DES
Plaintext = P= 3478AB12405123CB (in Hexadecimal form)
Key = 5123CB3478AB1240 (in Hexadecimal form)
(i) Derive K1, the first round sub key.
(ii) Calculate first round or first stage output.
31. In DES, the 16th round 64 bit output is 123CB3478AB12405 (in Hexadecimal form). Calculate
the 64 bit ciphertext of DES.
32. Find the value of x and y for the following equation:
1432 + 123211y = GCD (1432, 123211)
33. Calculate (1432-1) Mod 123211.
34. Find the GCD of 42823 and 6409.
35. Find two integers x and y such that 1759x+550y=GCD (1759, 550).
36. Check the set Z8 of integers {0, 1, 2, 3, 4, 5, 6, 7} with the arithmetic operations modulo 8 is a
fieldor not.
37. f(x) = (x7 + x5 + x4 + x3 + x + 1) and g(x) = (x3 + x + 1)
Calculate (i) f(x) + g(x) (ii) f(x) - g(x) (iii) f(x) g(x) (iv) f(x) / g(x) over GF(2)
38. f(x) = (x6 + x4 + x3+ x + 1), g(x) = (x7 + x + 1) and m(x) = (x8 + x4 + x3 + x + 1) calculate:
(i) f(x) + g(x) (ii) f(x).g(x) mod m(x) for GF( 28)
39. p1=x5+x2+x, p2=x7+x4+ x3+x+1 and IP=. x8+x4+ x3+x+1. Do the modular multiplication.
40. In AES, Given the state input matrix and round key for a round :