0% found this document useful (0 votes)
1K views

Cryptography - Assignment I

This document contains 5 sets of cryptography assignment questions for students. Set 1 contains questions about Fermat's theorem, modular arithmetic, solving simultaneous equations, symmetric vs asymmetric encryption, block cipher design principles, and Caesar and cipher feedback ciphers. Set 2 focuses on gcd calculations, Euler's totient function, DES cipher components, the Vigener cipher, and confidentiality, integrity and availability requirements. Set 3 defines Euler's theorem and its applications, compares stream and block ciphers with DES encryption/decryption, and explores Vigenere ciphers. Set 4 covers divisibility properties, DES modes of operation, transposition vs substitution ciphers, and output feedback mode. Set 5 asks about DES strengths/weaknesses, monoalphabetic

Uploaded by

Nava Bnn4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Cryptography - Assignment I

This document contains 5 sets of cryptography assignment questions for students. Set 1 contains questions about Fermat's theorem, modular arithmetic, solving simultaneous equations, symmetric vs asymmetric encryption, block cipher design principles, and Caesar and cipher feedback ciphers. Set 2 focuses on gcd calculations, Euler's totient function, DES cipher components, the Vigener cipher, and confidentiality, integrity and availability requirements. Set 3 defines Euler's theorem and its applications, compares stream and block ciphers with DES encryption/decryption, and explores Vigenere ciphers. Set 4 covers divisibility properties, DES modes of operation, transposition vs substitution ciphers, and output feedback mode. Set 5 asks about DES strengths/weaknesses, monoalphabetic

Uploaded by

Nava Bnn4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

VASAVI COLLEGE OF ENGINEERING (AUTONOMOUS), HYDERABAD - 31

DEPARTMENT OF INFORMATION TECHNOLOGY


Class: 4/4 IT , VII Sem , 2019-20
Subject: CRYPTOGRAPHY
ASSIGNMENT –I
Date: 28.08.2019
_____________________________________________________________________
SET:1 (Rnos:1602-16-737-004,006,007,008,009,010,011,013,015,017,018,019,020,022,023)
1. State the Fermat Theorem. Write the properties of modular arithmetic.
2. Determine gcd(4655, 12075).
3. Find the solution to the simultaneous equations:
x≡ 1 mod 5
x≡ 1 mod 7
x≡ 3 mod 11
4. Differentiate symmetric and asymmetric encryption?
5. Briefly explain the design principles of block cipher.
6. Apply Caesar cipher and k=5 decrypt the given Cipher text
“YMJTYMJWXNIJTKXNQJSHJ”.
7. Describe cipher feed back mode with an example.

SET :2 (Rnos: 1602-16-737-


025,026,028,029,030,031,035,036,037,039,040,041,042,043,044)
1. Determine gcd(24140, 16762).
2. Define Euler’s totient function or phi function and their applications.
3. Why is it important to use the Feistel cipher in DES?
4. List out the components of encryption algorithm. What are the different block cipher
modes of operation.
5. Apply Vigener cipher; encrypt the word “explanation” using the key “leg”.
6. Consider a desktop publishing system used to produce documents for various
organizations.
a. Give an example of a type of publication for which confidentiality of the stored
data is the most important requirement.
b. Give an example of a type of publication in which data integrity is the most
important requirement.
c. Give an example in which system availability is the most important requirement.

SET :3(Rnos: 1602-16-737-


047,048,049,050,053,054,055,058,059,060,301,302,304,306,307,309)
1. Define Euler’s theorem and it’s application.
2. Compare stream cipher with block cipher with example.
3. Draw the general structure of DES and explain the encryption decryption process.
4. This problem explores the use of a Vigenère cipher. In this scheme, the key is a stream
of random numbers between 0 and 26. For example, if the key is 3, 19, 5… , then the first
letter of plaintext is encrypted with a shift of 3 letters, the second with a shift of 19 letters, the
third with a shift of 5 letters.
a. Encrypt the plaintext “sendmoremoney” with the key stream
9 0 1 7 23 15 21 14 11 11 2 8 9
b. Using the ciphertext produced in part (a), find a key so that the cipher text decrypts
to the plaintext “cashnotneeded”.
5. Describe in detail about counter mode of operation.
SET:4(Rnos : 1602-16-737-061,066,067,069,073,074,075,077,082,086,088,089,090,095,096)
1. Write the properties of divisibility and Discrete logarithms.
2. Why do some block cipher modes of operation only use encryption while others use
both encryption and decryption?
3.Draw the general structure of DES and describe how encryption and decryption are
Carried out and identify the strength of DES algorithm.
4. Differentiate between transposition cipher and substitution cipher. Apply two stage
Transpositions Cipher on the “treat diagrams as single units” using the keyword
“sequence”.
5.What are the different modes of operation in DES? Describe in detail about output feed
back mode of operation.
6. Describe in detail about Chinese remainder theorem with an example.

SET:5(Rnos : 1602-16-737-098,099,102,105,109,112,114,117,119,120,316,318,320,321,322)
1. Mention the strengths and weakness of DES algorithm. Describe Triple DES and its
applications.
2. Determine the gcd (24140,16762) using Euclid’s algorithm.
3. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher?
4. What are the two basic functions used in encryption algorithms? Explain each with an
example.
5. Briefly define the Playfair cipher. And encrypt the message ”move forward” using the
key “ MONARCHY”.
6. Find an integer that has a remainder of 3 when divided by 7 and 13, but is divisible by
12 using CRT.

Last Date of submission : 03.09.2019

Faculty I/c

You might also like