K.J.
INSTITUTE OF ENGINEERING & TECHNOLOGY- SAVLI
ASSIGNMENT- 2024
CRYPTOGRAPHY NETWORK & SECURITY (3161606)
SEMESTER-6TH
DEPARTMENT- IT
Assignment-1
1. Define Cryptography and Cryptanalysis.
2. Encrypt the following text with Caesar cipher: (Key=3) “Welcome to the course
Information and Network security”
3. Differentiate public key cryptography and symmetric key cryptography. Explain any
one substitution method for symmetric key cryptography with example.
4. What is the difference between passive and active security threats? List and briefly
define categories of passive and active security attacks.
5. Encrypt the message “security” using Hill Cipher with key (9 4 5 7 )
6. List and define the three security goals.
7. Define (i) group (ii) Ring (iii) Field
8. Construct a Play fair matrix with the key “Trust” and encrypt the message “Be
confident in yourself”.
9. Explain different Types of Active attacks in details.
10. Explain Rail-fence technique with example.
11. Ramesh meets Suresh and says “Xayyogt lomnzkx pkzy gxk ut znk gzzgiq.” If he is
using Caesar Cipher, what does he want to convey?
12. Consider a mono-alphabetic cipher with the following key value: (A B C D I J K L E
F G H M N O P U V W X Q R S T Y Z) What will be the encrypted form of the
message “W I N D O W”?
13. Construct a playfair key matrix with the key “injection”
Assignment-2
1. List and Explain various modes of operations of block cipher in details
2. Explain single round of DES algorithm
3. Explain the steps in the various rounds of AES.
4. List down various modes of operations of block cipher and explain any three of them
briefly.
5. Explain Key Expansion in AES algorithm.
6. Explain four different stages of AES(Advance Encryption standard) structure.
7. Justify how DES(Data Encryption standard) algorithm observes Fiestel structure.
Discuss use of S-box in DES algorithm
Assignment-3
1. Let p=11 and q=7. Then find multiplicative inverse of 13 modulo Φ(pq
2. Discuss Diffie-Hellman key exchange algorithm with example.
3. Define Man in the middle attack.
4. Perform encryption and decryption using RSA algorithm for following:
p=3;q=13,e=5;M=10
5. Discuss RSA algorithm. Also Find d and cipher text C using P=3 q=11 e=7 and m=10
6. Explain the processing of a single block of SHA-1 algorithm in detail.
Assignment-4
1. Explain SSL handshake protocol.
2. What is the purpose of HTTPS?
3. Explain Kerberos Protocol with Suitable Diagram
4. Explain various fields in X.509 certificate format.
5. Write a short note on Secure Socket Layer.
6. Describe Elgamal digital signature.
7. What is message authentication? Explain the requirements of message authentication.
8. What is digital signature? Explain Elgamal digital signature scheme in detail.
9. Demonstrate the working SSL Record Protocol.
10. Explain key distribution process using Key Distribution Center (KDC).