0% found this document useful (0 votes)
109 views1 page

Cryptography Techniques & Analysis

This document discusses several cryptographic techniques including: 1. Hill cipher and Playfair cipher encryption and decryption. 2. Features of monoalphabetic ciphers and why they are easy to break. 3. The difference between passive and active attacks and examples of each. 4. Types of cryptographic systems and attacks on encrypted messages. 5. Encryption and decryption using Hill cipher with example keys. 6. Encrypting the message "ACT" using a Hill cipher key. 7. The working of Playfair cipher with an example. 8. The overall structure and working of simplified DES. 9. Computations in a single round of the DES algorithm. 10. Working

Uploaded by

Rakshan TA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views1 page

Cryptography Techniques & Analysis

This document discusses several cryptographic techniques including: 1. Hill cipher and Playfair cipher encryption and decryption. 2. Features of monoalphabetic ciphers and why they are easy to break. 3. The difference between passive and active attacks and examples of each. 4. Types of cryptographic systems and attacks on encrypted messages. 5. Encryption and decryption using Hill cipher with example keys. 6. Encrypting the message "ACT" using a Hill cipher key. 7. The working of Playfair cipher with an example. 8. The overall structure and working of simplified DES. 9. Computations in a single round of the DES algorithm. 10. Working

Uploaded by

Rakshan TA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

Describe the working of Hill cipher and Compute the cipher text using Hill cipher
technique with the plaintext being “msritabcd” and also obtain the plain text back
from cipher text and the key used is

17 17 5
K=(21 18 21)
2 2 19

2. Explain the working of Playfair Cipher with an example

3. List out the salient features of monoalphabetic ciphers and explain why
monoalphabetic ciphers are easy to break

4. Differentiate between passive attack and active attack and list out different active and
passive attacks

5. List out three different types of cryptographic systems and explain different types of
attacks on encrypted messages

6. Describe the working of Hill cipher and Compute the cipher text using Hill cipher
technique with the plaintext being “telecomab” and also obtain the plain text back
from cipher text and the key used is
17 17 5
K=(21 18 21)
2 2 19

7. Encrypt the message “ACT” using the HILL Cipher key

6 24 1
13 16 10
20 17 15

8. Explain the working of Playfair Cipher with an example

9. Write the overall structure of Simplified -DES and explain its working

10. With block diagram illustrate the computations carried out in a single round in DES
algorithm

11. Illustrate with relevant block diagram the working of Cipher block chaining mode,
Cipher feedback mode output feedback modes of operation

12. List out the criteria used in the design of S-boxes which were used in DES algorithm

13. Assume that in Simplified DES the 10 bit key is 1111001110 and P10 permutation is
{3 5 2 7 4 10 1 9 8 6} and P8 permutation is {6 3 7 4 8 5 10 9} compute sub keys K 1
and K2

14. Briefly Outline the 5 Block Cipher Modes of Operation and their typical applications

15. Problem on des

You might also like