Unit-1
Unit-1
1. Question
Identify the Correct Option and Provide an Explanation Based on the Concept of Semantic Security :
Assertion (A): A cryptosystem is considered semantically secure (SS) if its ciphertexts do not reveal any useful information
about the original plaintext, even when multiple ciphertexts are available to an attacker.
Reason (R): In a semantically secure encryption scheme, an adversary cannot determine which of two messages corresponds
to a given ciphertext, even with unlimited computational ability. This guarantees that no information about the plaintext can be
inferred from the ciphertext.
Options:
a) Assertion matches with the reason.
b) Assertion is correct, but the reason is wrong.
c) Assertion and reason are both wrong.
d) Assertion is wrong, but the reason is correct.
2. Question
Rammohan, a dedicated placement officer, needs to share details about an upcoming assessment test, including the schedule
and topics, with his students. However, since he is posting this information on a public bulletin board, he wants to prevent
unauthorized individuals from easily reading it. To achieve this, he decides to use the Caesar Cipher, a simple encryption technique
that shifts each letter in the plaintext forward by a fixed number of positions in the alphabet.
Mr. Smith uses a shift key of 5, meaning each letter in the message is replaced by the letter Five places ahead in the alphabet.
Now, apply the same process to encrypt "Continuous Assessment Test" and determine the secure version of the message before
posting it publicly.
Hint:
The plaintext "WELCOME" encrypts to "BJQHTRJ"
3. Question
While coordinating a highly confidential international diplomatic conference, you and your team must prevent unauthorized acc ess
to the schedule. To enhance security and avoid interception via email, you choose to encrypt the schedule using the Row -Column
Transposition Cipher, a simple yet reliable cryptographic technique.
For encryption, you use a Columnar Transposition Cipher with the key: "3,1,4,2".
Apply the Row-Column Transposition Cipher to find the encrypted version of the message.
4. Question
Benny is making an online purchase on a secure e-commerce platform that prioritizes data protection. To keep her credit card
information and billing details safe, the platform uses RSA encryption. The server possesses an RSA key pair, where the publi c
key encrypts the data, and the private key decrypts it. When Benny enters her payment details, her browser encrypts them using
the platform’s public key, ensuring that only the platform can access the original information using its private key.
The encrypted credit card data, represented as ciphertext C = 45, is securely transmitted to the platform. The server must now
decrypt this ciphertext using its RSA private key (d, n) = (23, 187).
d
Using the RSA decryption formula: M= C mod n , Calculate the original plaintext P, representing Benny ’s sensitive data before
encryption.
5. Question
Identify the incorrect two statements about symmetric key encryption process features from the listed statements.
Statement 1: The same symmetric key can be used for encryption and decryption of multiple files securely.
Statement 2: Using different keys for each encryption process is unnecessary for security.
Statement 3: Reusing the same key for different datasets can lead to vulnerabilities if the same plaintext results in the sam e
ciphertext.
Statement 4: Symmetric key encryption ensures unique ciphertext for identical plaintexts across different datasets.
6. Question
TechSoftCorp software company, which operates offices in Mumbai and Pune, regularly transmits sensitive financial reports such
as quarterly earnings and payroll data over the internet. To safeguard the confidentiality and integrity of these communications, they are
exploring various encryption methods. A diagram depicting symmetric and asymmetric encryption is provided.
Identify the missing elements and complete the diagram by adding the appropriate encryption and decryption components.