0% found this document useful (0 votes)
20 views3 pages

CNSSQ Assignment

Uploaded by

rahul.work1017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

CNSSQ Assignment

Uploaded by

rahul.work1017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CNS ASSIGNMENT(SQ)

1. Briefly explain the two terms: Information security and Network security.
2. Explain the key objectives associated with computer security.
3. As a security designer list out the challenges to be handled to maintain computer security.
4. Explain the following terms in the context of cryptography.
(i) Cryptosystem (ii) Cryptanalysis (iii) Cryptology
5. State the difference between substitution and transposition technique of ciphering with suitable
examples.
6. Differentiate between Monoalphabetic and Polyalphabetic ciphering.
7. With suitable diagram explain the Symmetric encryption model.
8. Decrypt the message “wigyvmxc rixiv gsqiw jsv jvii” using caeser cipher with key = 4. Mention
why the caeser ciphering technique is prone to brute force attack.
9. Encrypt the message “knowledge is power” using mono alphabetic cipher. Using the keyword
“Kryptos”.
10. Encrypt the following using the play fair cipher using the keyword MONARCHY. “SWARAJ IS
MY BIRTH RIGHT”. Use X for blank spaces.
11. Define the following terms:
(I) Cryptography (II) Cryptanalysis (III) Brut force attack (IV) Computer security (V) Network
security
12. The ciphertext using Caesar cipher is C = PHHW PH DIWHU WKH WRJD SDUWB. Determine
the key value „K‟ and plaintext „P‟ using Brute force cryptanalysis.
13. Assume a particular language has unique 46 alphabets. Specify the maximum number of brute-
force attempts required to determine the key for caeser cipher.
14. Decrypt TGLDUCH HOTL LSUOLS AGC QRHKSHG, which was formed using a simple
monoalphabetic substitution cipher with the keyword APPALACHIAN STATE.
15. Consider a Playfair cipher with keyword “SECRET”. Decrypt “ENNGOHWSTEMEZY”, which
was formed using this cipher (assuming j is combined with i)?
3 10 20
16. Encrypt the plaintext cipher using the Hill cipher for the key value (20 9 17).
9 4 17
2 3
17. Determine the inverse mod 26 of ( ).
13 7
21 13 25
18. Calculate the determinant mod 26 of ( 5 7 18).
3 14 12
10 9
19. Decrypt the ciphertext VZFJ using the Hill cipher for the key value ( ).
1 2
9 4
20. Convert “ALL THE BEST” using Hill cipher with the key matrix ( ).
5 7
21. Differentiate between Vigenere and Vernam cipher.
22. Use key “network” and encrypt “This is a book on security” using Vigenere cipher.
23. What would be the transformation of a message „Happy birthday to you‟ using rail-fence
technique of depth (i) 3 (ii) 4.
24. Consider the Ciphertext “BTLNE SWOMY EOGEU CITAT ODABT UHR”. Using the Rail
Fence Cipher, find out the plaintext for key value 2.
25. Consider a columnar transposition cipher with the keyword MAYBERRY. Use this cipher to
encrypt THE ANDY GRIFFITH SHOW WAS SET INRURAL MAYBERRY NORTH
CAROLINA, padded with Xs (if necessary) so each column in the array will have the same
number of letters.
26. Decrypt a cipher text “TTNAAPTMTSUOAODWCOIXPETZKNLY” using a columnar
transposition cipher of one round with a key 4312576.
27. Draw the Fiestel cipher structure that uses only three rounds of processing to generate the
ciphertext.
28. Using the structure mentioned in Q23 generate the ciphertext (in Hexadecimal form) for the 16
bits plaintext “9AC8” (in Hexadecimal form). Assume the round function as logic AND
operation and the subkeys for round 1, 2, 3 are “34”, “56”, “13” (in Hexadecimal form)
respectively.
29. State how the inverse initial permutation table is created from initial permutation table.
30. In DES
Plaintext = P= 3478AB12405123CB (in Hexadecimal form)
Key = 5123CB3478AB1240 (in Hexadecimal form)
(i) Derive K1, the first round sub key.
(ii) Calculate first round or first stage output.
31. In DES, the 16th round 64 bit output is 123CB3478AB12405 (in Hexadecimal form). Calculate
the 64 bit ciphertext of DES.
32. Find the value of x and y for the following equation:
1432 + 123211y = GCD (1432, 123211)
33. Calculate (1432-1) Mod 123211.
34. Find the GCD of 42823 and 6409.
35. Find two integers x and y such that 1759x+550y=GCD (1759, 550).
36. Check the set Z8 of integers {0, 1, 2, 3, 4, 5, 6, 7} with the arithmetic operations modulo 8 is a
fieldor not.
37. f(x) = (x7 + x5 + x4 + x3 + x + 1) and g(x) = (x3 + x + 1)
Calculate (i) f(x) + g(x) (ii) f(x) - g(x) (iii) f(x) g(x) (iv) f(x) / g(x) over GF(2)
38. f(x) = (x6 + x4 + x3+ x + 1), g(x) = (x7 + x + 1) and m(x) = (x8 + x4 + x3 + x + 1) calculate:
(i) f(x) + g(x) (ii) f(x).g(x) mod m(x) for GF( 28)
39. p1=x5+x2+x, p2=x7+x4+ x3+x+1 and IP=. x8+x4+ x3+x+1. Do the modular multiplication.
40. In AES, Given the state input matrix and round key for a round :

(State Matrix) (Round Key)

Calculate the matrix at the end of the round


41. Explain Multiple Encryption and Triple DES.
42. Explain with diagram: TRNG, PRNG, and PRF.
43. If a=5, c=1, m=8 and starting seed value is 3, by using LCG find the pseudo random numbers.
44. If a=1, c=1, m=100 and starting seed value is 23, by using LCG find the pseudo random numbers.
45. If p=11, q=19 and seed=3 by using blum blum shub algorithim find the pseudo random numbers.
46. Using p=3, q=13, d=7 and e=3 in the RSA algorithm what is the cipher text for the plain text 5.
47. Using the RSA public key cryptosystem p=13, q=13, d=7, then the value of e is?
48. Explain various types of random and pseudo random number generators.
49. Perform encryption and decryption using the RSA algorithm, for the following:p = 3; q = 7, e =
5; M = 10.
50. What is cryptographic hash function and explain how it is used for message authentication?
51. What are the message authentication requirements?
52. Explain the basic uses of message encryption with diagram.
53. Explain MAC and its use.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy