Beruflich Dokumente
Kultur Dokumente
SECTION-A
Q1. Differentiate between cryptography and cryptanalysis.
Non repudiation: Requires that neither the sender nor the receiver
of a message be able to deny the transmission.
1. Encipherment
2. DigitalSignature
3. Access Control
For each plain text letter p, substitute the cipher text letter c such
that
C=E(p)=(p+3)mod 26
C=E(p)=(p+k) mod 26
P=D(C)=(C-k) mod 26
The matrix used for encryption is the cipher key, and it should be
chosen randomly from the set of invertible n x n matrices (modulo
26).
1.Rail fence
2. Row transposition
MEATECOLOS
ETTHSHOHUE
MEATECOLOSETTHSHOHUE
SECTION-C
Q1. Explain Security Attacks. How are they classified? Explain in
detail?
The letter "I" and "J" count as one letter. Plain text is encrypted two
letters at a time According to the following rules:
* Repeating plain text letters that would fall in the same pair are
separated with a filler letter such as "X".
Keyword: MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Cipher text: CL KL CL RS PD IL HY AV MP HF XL IU