Information & Network Security (BIS703)
Module-1 Questions
Sl. Questions BT CO
No
1 What is information security? With a neat diagram, explain crypto L2
as a black box.
Or
Explain the following terms a) Cryptology b) Cryptography
c)Cryptanalysis. Compute encryption of the plaintext
VSRQJHERE VTX DUHSDQWU using CAESAR cipher.
Assume shift positions k=3.
2 Using Vernam cipher encypt the plaintext “heilhitler” to ciphertext L2
and from ciphertext to plaintext using the key
111 101 110 101 111 100 000 101 110 000
And the corresponding binary representation of letter as below
table:
3 Explain simple substitution with an example. Given the Caesar’s L2
cipher find the plain text from the cipher text
DQWUDUHSVSRQJERHER
Or
Given the Caesar’s cipher, find plain text from the cipher text
DQWUDOHSVSRQJERHEROR
4 Define exhaustive key search. L1 CO1
5 What is double transposition cipher? Encrypt the message, “we are L2
all together”. Using a double transposition cipher with 4rows and
4columns, using row permutation (1,2,3,4) -> (2,4,1,3) and
columns permutation (1,2,3,4) -> (3,1,2,4)
or
Write a brief note on double transposition with an example.
6 How does Vigenere cipher work? Give an example. L2
7 Explain the taxonomy of Cryptography and Cryptanalysis. L2
8 Explain in detail double transposition cipher. Encrypt the message L2
we are all together using a double transposition cipher (of the type
described in the text) with 4 rows and 4 columns, using the row
permutation (1,2,3,4) —> (2,4,1,3) and the column permutation
(1,2,3,4) —> (3,1,2,4).
9 Explain One-time Pad. Apply one time pad to encrypt and decrypt L2
the data given heilhitler ; refer data
e=000, h=001, i=010, k=011, l=100, r=101, s=110, t=111 and
key : 7565740560.
10 Write a short notes on: L2
(i) Project VENONA
(ii) Codebook cipher
(iii) Confusion and diffusion.
or
Explain the concept of Project VENONA and Codebook cipher
or
Define the terms confusion and diffusion in the context of
cryptology.