This document outlines 25 questions for an assignment on cryptography and network security. The questions cover a range of topics including:
1) The difference between computationally secure and unconditionally secure ciphers with examples.
2) The parameters and design choices that determine the algorithm of a Feistel cipher.
3) Encrypting a message using an additive cipher with a given key.
4) The necessity of block cipher modes of operation.
5) Discussing digital signature schemes using RSA.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
34 views
Crypto Assignment 1
This document outlines 25 questions for an assignment on cryptography and network security. The questions cover a range of topics including:
1) The difference between computationally secure and unconditionally secure ciphers with examples.
2) The parameters and design choices that determine the algorithm of a Feistel cipher.
3) Encrypting a message using an additive cipher with a given key.
4) The necessity of block cipher modes of operation.
5) Discussing digital signature schemes using RSA.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Cryptography & N/W security Assignment 1
Last Date for Submission 24/12/2022
(Don’t wait for last date)
1. Differentiate between computationally secure cipher and unconditionally
secure cipher. Write examples with reasoning. 2. Which parameters and design choices determine the actual algorithm of a Fiestel Cipher 3. Encrypt the message “this is an exercise” using the additive Cipher with key=20 4. What is the necessity of block cipher modes of operation? 5. Discuss digital signature scheme using RSA. 6. Why the attacker is not able to recognize the actual sender of the message in encrypted tunnels? 7. How key generation is done in DES. 8. Illustrate the working of SHA-1 with diagrams. 9. What are the Security Requirements of message authentication? 10. Explain the method of protecting IP datagram from replay attack using IPsec. 11. Explain the sequence of steps used in Secure Socket Layer handshake Protocol for establishing a new session. Draw a diagram which shows the action of Handshake Protocol. 12. Explain confusion and diffusion properties of modern block ciphers. 13. Differentiate between symmetric and asymmetric cryptosystem. 14. What are the requirements of a good hash function 15. How digital signature is implemented using RSA approach 16. List the various attacks that can be made on packet filtering routers and mention appropriate counter measures 17. Differiante between monoalphabetic and polyalphabetic ciphers with example 18. Explain the S-box design of DES algorithm. 19. Explain the key generation in AES algorithm 20. How signing and verification is done in Digital Signature algorithm 21. Illustrate Elliptic Curve Encryption/Decryption 22. Discuss about the various types of firewalls 23. Explain the role of Security Association and SA selectors in IPSec 24. Explain the various protocols used in SSL 25. Explain the construction of dual signature in SET protocol