0% found this document useful (0 votes)
67 views2 pages

Crypt

Cryptography

Uploaded by

midhulasrikj3053
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views2 pages

Crypt

Cryptography

Uploaded by

midhulasrikj3053
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

PART – A (6 × 2 = 12 Marks)

Answer All Questions

1.​ State the requirements of network security.


2.​ What is cryptanalysis? List the possible attacks on cryptosystems.
3.​ How does steganography differ from cryptography?
4.​ Apply Brute-Force Cryptanalysis of Caesar Cipher on the given Cipher Text: "EXXEG
OE XSRGI" and find the Plain Text.
5.​ List down the properties of congruence.
6.​ Determine gcd (4655, 12075).

PART – B (2 × 5 = 10 Marks)

Answer All Questions

7.​ State the requirements of conventional encryption and describe the components
involved in the process with a neat sketch.
8.​ State the properties of Modular Arithmetic for Integers in Z .

PART – C (2 × 14 = 28 Marks)

Answer All Questions

9. (a)​
(i) Encrypt the message "SONA COLLEGE" using the Playfair matrix with the key "ELITE"
and get the ciphertext.​
(ii) Encrypt the following message using Rail Fence cipher with the key as 3. The plaintext is
"This is a secret message."

(or)For each of the following, consider as low, moderate, or high impact level for the loss of
confidentiality, availability, or integrity:

●​ a. A system storing sensitive data that is managing sensitive information such as


passwords.
●​ b. An administration system,
●​ c. The systems that are part of a psychological laboratory environment
OR

9. (b)​
(i) Encrypt the given plain text using the keyword "ETHICS"​
Plain Text: "EVERY ONE MUST FOLLOW" using Vigenere cipher.​
(ii) Encrypt the message "MEET ME AT THE USUAL PLACE" using the Hill cipher with the
key . Show your calculations and the result.

10. (a)​
(i) Discuss shortly the various active and passive attacks with examples.​
(ii) Calculate the value of 12⁸ mod 14 using the congruence method.

OR

10. (b)​
(i) Briefly define the three key objectives of computer security. Consider a payment gateway
system where a user pays for an item using their account via the payment gateway. How the
above mentioned security key objectives are ensured?​
(ii) Prove that Z₁₇ is a field with respect to ‘+’ and ‘×’.

You might also like