Sie sind auf Seite 1von 7

First Sessional

Cryptography And Network Security


(RIT-701)

SECTION-A
Q1. Differentiate between cryptography and cryptanalysis.

Cryptograpy: The art or science of encrypting plain messages into


cipher text for security of the messages especially while transmission.

Cryptanalysis: The art of obtaining plain text from a cipher text


without knowledge of key.

Q2. What are the requirements of secure communication?

Q3. Define Steganography.

Steganography is data hidden within data. Steganography is an


encryption technique that can be used along with cryptography as an
extra-secure method in which to protect data.Steganography
techniques can be applied to images, a video file or an audio file.

Q4. What is Mono-alphabetic cipher?

Monoalphabetic cipher is a substitution cipher in which for a given


key, the cipher alphabet for each plain alphabet is fixed throughout
the encryption process.

Q5. What is Classical encryption technique?

There are two basic building blocks of all encryption techniques:


Substitution and Transposition.
SECTION-B
Q1. Explain Stream cipher and Block cipher in brief.

Stream Cipher: A stream cipher processes the input elements


continuously, producing output element one at a time,as it goes
along. Its use for small messages.

Block Cipher: A block cipher processes the input and block of


elements at a time, producing output block for each input block. Its
use for large messages.

Q2. Define the concepts of confusion and diffusion with a suitable


example.

Q3. What are the different security services in Cryptography?

The classification of security services are as follows:

Confidentiality: Ensures that the information in a computer system


and transmitted information are accessible only for reading by
authorized parties.

Authentication: Ensures that the origin of a message or electronic


document is correctly identified, with an assurance that the identity
is not faise.

Integrity: Ensures that only authorized parties are able to modify


computer system assets and transmitted information. Modification
includes writing, changing status, deleting, creating and delaying or
replaying of transmitted messages.

Non repudiation: Requires that neither the sender nor the receiver
of a message be able to deny the transmission.

Access control: Requires that access to information resources may be


controlled by or the target system.

Availability: Requires that computer system assets be available to


authorized parties when needed.

Q4. Explain the security mechanism of Cryptography.

A mechanism that is designed to detect, prevent or recover from a


security attack.

One of the most specific security mechanisms in use is cryptographic


techniques. Encryption or encryption-like transformation are the
most common means of providing security. Some of the mechanisms
are

1. Encipherment

2. DigitalSignature

3. Access Control

Q5. What is symmetric and asymmetric key Cryptograpy?

Symmetric key cryptograpy: Symmetric encryption uses a single key


that needs to be shared among the people who need to receive the
message.

Asymmetric key crypytograpy: Asymmetric encryption uses a pair of


public key and a private key to encrypt and decrypt messages when
communicating.

Q6. Explain the Caesar cipher algorithm with suitable example.

The earliest known use of a substitution cipher and the simplest


was by Julius Caesar. The Caesar cipher involves replacing each letter
of the alphabet with the letter standing 3 places further down the
alphabet.

e.g., plain text : pay more money


Cipher text : SDB PRUH PRQHB

Note that the alphabet is wrapped around, so that letter following


"z" is "a".

For each plain text letter p, substitute the cipher text letter c such
that

C=E(p)=(p+3)mod 26

A shift may be any amount, so that general Caesar algorithm is

C=E(p)=(p+k) mod 26

Where k takes on a value in the range 1 to 25. The decryption


algorithm is simply

P=D(C)=(C-k) mod 26

Q7. Discuss the concept of Hill cipher.

Hill cipher is a polygraphic substitution cipher based on linear


algebra. Each letter is represented by a number modulo 26.Often the
simple scheme A=0, B=1, ..., Z=25 is used, but this is not an essential
feature of the cipher. To encrypt a message, each block of n letters is
multiplied by an invertible

n X n matrix, against modulus 26. To decrypt the message, each


block is multiplied by the inverse of the matrix used for encryption .

The matrix used for encryption is the cipher key, and it should be
chosen randomly from the set of invertible n x n matrices (modulo
26).

Q8. What are different Transposition techniques? Explain Rail fence


technique with an example.

All the techniques examined so far involve the substitution of a


cipher text symbol for a plain text symbol. A very different kind of
mapping is achieved by performing some sort of permutation on he
plain text letters. This technique is referred to as a transposition
cipher.

1.Rail fence

2. Row transposition

Rail fence technique: Rail fence is simplest of such cipher, in which


the plain text is written down as a sequence of diagonals and then
read off as a sequence of rows.

Plain text = meet at the school house

To encipher this message with a rail fence of depth 2, we write the


message as follows:

MEATECOLOS

ETTHSHOHUE

The encrypted message is

MEATECOLOSETTHSHOHUE

SECTION-C
Q1. Explain Security Attacks. How are they classified? Explain in
detail?

Any action that compromises the security of information owned by


an organization.

Q2. What is Substitution technique? Explain Playfair cipher with


an example.
A substitution technique is one in which the letters of plain text are
replaced by other letters or by numbers or symbols. If the plain text
is viewed as a sequence of bits, then substitution involves replacing
plain text bit patterns with cipher text bit patterns.

Example of Playfair cipher:

In this playfair cipher algorithm is based on the use of 5x5 matrix of


letters constructed using a keyword. Filling in the remainder of the
matrix with the remaining letters inalphabetical order.

The letter "I" and "J" count as one letter. Plain text is encrypted two
letters at a time According to the following rules:

* Repeating plain text letters that would fall in the same pair are
separated with a filler letter such as "X".

Keyword: MONARCHY

M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z

Plain text: MEET ME AT THE SCHOOL HOUSE

Splitting two letters as a unit: ME ET ME AT TH ES CH OX OL HO US


EX

Cipher text: CL KL CL RS PD IL HY AV MP HF XL IU

Q3. What is cryptographic attack? Explain in detail.

Das könnte Ihnen auch gefallen