1.
Describe the working of Hill cipher and Compute the cipher text using Hill cipher
technique with the plaintext being “msritabcd” and also obtain the plain text back
from cipher text and the key used is
17 17 5
K=(21 18 21)
2 2 19
2. Explain the working of Playfair Cipher with an example
3. List out the salient features of monoalphabetic ciphers and explain why
monoalphabetic ciphers are easy to break
4. Differentiate between passive attack and active attack and list out different active and
passive attacks
5. List out three different types of cryptographic systems and explain different types of
attacks on encrypted messages
6. Describe the working of Hill cipher and Compute the cipher text using Hill cipher
technique with the plaintext being “telecomab” and also obtain the plain text back
from cipher text and the key used is
17 17 5
K=(21 18 21)
2 2 19
7. Encrypt the message “ACT” using the HILL Cipher key
6 24 1
13 16 10
20 17 15
8. Explain the working of Playfair Cipher with an example
9. Write the overall structure of Simplified -DES and explain its working
10. With block diagram illustrate the computations carried out in a single round in DES
algorithm
11. Illustrate with relevant block diagram the working of Cipher block chaining mode,
Cipher feedback mode output feedback modes of operation
12. List out the criteria used in the design of S-boxes which were used in DES algorithm
13. Assume that in Simplified DES the 10 bit key is 1111001110 and P10 permutation is
{3 5 2 7 4 10 1 9 8 6} and P8 permutation is {6 3 7 4 8 5 10 9} compute sub keys K 1
and K2
14. Briefly Outline the 5 Block Cipher Modes of Operation and their typical applications
15. Problem on des