Be Sem 6 Pending Exam Form Data
Be Sem 6 Pending Exam Form Data
Explain the various types of cryptanalytic attack, based on the amount of information known to
the cryptanalyst.
Q.2. Explain the conventional security model used for information security.
Q.3. Define the Terms:
Confidentiality, Integrity, Availability, Threat, Authentication, Nonrepudiation,
Cryptography, Cryptanalysis, brute force attack, Avalanche Effect, Access Control,
Relative Prime Number, diffusion and confusion.
Q.4. Explain different Types of Active attacks and passive attacks in details.
Q.5. Explain the Caesar cipher with example.
Q.6. A) What is the difference between a mono alphabetic cipher and a polyalphabetic cipher?
B) Consider a mono-alphabetic cipher with the following key value: (A B C D I J K L E F
G H M N O P U V W X Q R S T Y Z) What will be the encrypted form of the message
“W I N D O W”?
Q.7. A) Explain playfair cipher with example.
B) Construct a playfair matrix with the key “engineering”. And encrypt the message “test
this process”.
Q.8. A) Encrypt the message “EXAM” using the Hill Cipher with the Key = “HILL”
B) Encrypt the Plaintext “safe messages” for the given key: “ciphering”
C) Encrypt the message “security” using Hill Cipher with key (9 4 5 7 )
D) Encrypt the message “GTU Examination” using the Hill cipher algorithm with the key
matrix