0% found this document useful (0 votes)
7 views

Unit-1

The document presents a series of questions related to modern cryptography, covering topics such as semantic security, encryption techniques like the Caesar Cipher and Row-Column Transposition Cipher, and the RSA encryption method. It includes practical scenarios for applying these concepts, such as securing sensitive information during online transactions and ensuring confidentiality in communications. Additionally, it addresses features of symmetric key encryption and requires the identification of incorrect statements regarding its process.

Uploaded by

sumalesh.it22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Unit-1

The document presents a series of questions related to modern cryptography, covering topics such as semantic security, encryption techniques like the Caesar Cipher and Row-Column Transposition Cipher, and the RSA encryption method. It includes practical scenarios for applying these concepts, such as securing sensitive information during online transactions and ensuring confidentiality in communications. Additionally, it addresses features of symmetric key encryption and requires the identification of incorrect statements regarding its process.

Uploaded by

sumalesh.it22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Discourse

22IT020 - MODERN CRYPTOGRAPHY

1. Question
Identify the Correct Option and Provide an Explanation Based on the Concept of Semantic Security :

Assertion (A): A cryptosystem is considered semantically secure (SS) if its ciphertexts do not reveal any useful information
about the original plaintext, even when multiple ciphertexts are available to an attacker.
Reason (R): In a semantically secure encryption scheme, an adversary cannot determine which of two messages corresponds
to a given ciphertext, even with unlimited computational ability. This guarantees that no information about the plaintext can be
inferred from the ciphertext.
Options:
a) Assertion matches with the reason.
b) Assertion is correct, but the reason is wrong.
c) Assertion and reason are both wrong.
d) Assertion is wrong, but the reason is correct.

2. Question
Rammohan, a dedicated placement officer, needs to share details about an upcoming assessment test, including the schedule
and topics, with his students. However, since he is posting this information on a public bulletin board, he wants to prevent
unauthorized individuals from easily reading it. To achieve this, he decides to use the Caesar Cipher, a simple encryption technique
that shifts each letter in the plaintext forward by a fixed number of positions in the alphabet.

Given the plaintext:


"Continuous Assessment Test"

Mr. Smith uses a shift key of 5, meaning each letter in the message is replaced by the letter Five places ahead in the alphabet.
Now, apply the same process to encrypt "Continuous Assessment Test" and determine the secure version of the message before
posting it publicly.

Hint:
The plaintext "WELCOME" encrypts to "BJQHTRJ"

3. Question
While coordinating a highly confidential international diplomatic conference, you and your team must prevent unauthorized acc ess
to the schedule. To enhance security and avoid interception via email, you choose to encrypt the schedule using the Row -Column
Transposition Cipher, a simple yet reliable cryptographic technique.

To demonstrate this method, you choose to encrypt the message:


"MEET ME TOMORROW IN LIBRARY ROOM"

For encryption, you use a Columnar Transposition Cipher with the key: "3,1,4,2".

Apply the Row-Column Transposition Cipher to find the encrypted version of the message.

[ Hint - Partial Steps: ]


1) Arrange the message into a row-column grid based on the key.

2) Rearrange the columns according to the given key order.

3) Derive the final ciphertext after transposition.

4. Question
Benny is making an online purchase on a secure e-commerce platform that prioritizes data protection. To keep her credit card
information and billing details safe, the platform uses RSA encryption. The server possesses an RSA key pair, where the publi c
key encrypts the data, and the private key decrypts it. When Benny enters her payment details, her browser encrypts them using
the platform’s public key, ensuring that only the platform can access the original information using its private key.

The encrypted credit card data, represented as ciphertext C = 45, is securely transmitted to the platform. The server must now
decrypt this ciphertext using its RSA private key (d, n) = (23, 187).
d
Using the RSA decryption formula: M= C mod n , Calculate the original plaintext P, representing Benny ’s sensitive data before
encryption.

Figure: RSA Encryption & Decryption.

5. Question
Identify the incorrect two statements about symmetric key encryption process features from the listed statements.
Statement 1: The same symmetric key can be used for encryption and decryption of multiple files securely.
Statement 2: Using different keys for each encryption process is unnecessary for security.
Statement 3: Reusing the same key for different datasets can lead to vulnerabilities if the same plaintext results in the sam e
ciphertext.
Statement 4: Symmetric key encryption ensures unique ciphertext for identical plaintexts across different datasets.

6. Question
TechSoftCorp software company, which operates offices in Mumbai and Pune, regularly transmits sensitive financial reports such
as quarterly earnings and payroll data over the internet. To safeguard the confidentiality and integrity of these communications, they are
exploring various encryption methods. A diagram depicting symmetric and asymmetric encryption is provided.
Identify the missing elements and complete the diagram by adding the appropriate encryption and decryption components.

Figure: Asymmetric Encryption.

Figure: Symmetric Encryption.


Hint:
Public key encryption, AES, Private key encryption, cipher text, public key decryption, secret key encryption, Plain text, secret key
decryption, 128 Bit Key, 256 Bit Key.

You might also like