Charotar University of Science and Engineering Devang Patel Institute of Advance Technology and Research
This document contains an assignment on information security and cryptography for a computer engineering course. The assignment includes encrypting messages using various ciphers like additive, multiplicative, affine, Vigenere, autokey, Playfair, and hill ciphers. It also involves using attacks like brute force and chosen plaintext attacks to decrypt encrypted messages. Additionally, it requires explaining the components of modern block ciphers, distinguishing between diffusion and confusion, synchronous and nonsynchronous stream ciphers, and explaining Feistel block ciphers.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
108 views
Charotar University of Science and Engineering Devang Patel Institute of Advance Technology and Research
This document contains an assignment on information security and cryptography for a computer engineering course. The assignment includes encrypting messages using various ciphers like additive, multiplicative, affine, Vigenere, autokey, Playfair, and hill ciphers. It also involves using attacks like brute force and chosen plaintext attacks to decrypt encrypted messages. Additionally, it requires explaining the components of modern block ciphers, distinguishing between diffusion and confusion, synchronous and nonsynchronous stream ciphers, and explaining Feistel block ciphers.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Charotar University of Science and Engineering
Devang Patel Institute of Advance Technology and Research
Department of Computer Engineering / Computer Science & Engineering Academic Year : 2019 – 2020 [6th Sem]
Information Security / Cryptography and Network Security
Assignment – 1 1. Define three security goals. 2. Give the relationship between security services and mechanisms. 3. Encrypt the message “this is an exercise” using following ciphers A. Additive cipher with key = 20 B. Multiplicative cipher with key = 15 C. Affine cipher with key = (15,20) D. Vigenere cipher with key = “dollars” E. Autokey cipher with key = 7 F. Playfair with key = “dollars” 4. Use a hill cipher to encipher the message “we live in an insecure world”. Use following key: Key K= 03 02 05 07 5. Use a brute-force attack to decipher the following message enciphered by Alice using additive cipher. Suppose that Alice always uses a key that is close to her birthday, which is on 13th of the month. C.T = NCJAEZRCLASJLYODEPRLYZRCLASJLCPEHZDTOPDZQLNZTY 6. Use chosen plaintext attack to decipher the following message. Assume that you know it is an affine cipher and that the plaintext “ab” is enciphered to “GL” C.T = XPALASXYFGFUKPXUSOGEUTKCDGFXANMGNVS 7. List and Explain components of modern block ciphers in detail. 8. Distinguish between diffusion and confusion. 9. Distinguish between synchronous and nonsynchronous stream cipher. 10. Explain feistel block cipher with proof.