Assignment IS
Assignment IS
Assignment-1
1. List and explain different types of attacks.
2. Explain Caesar cipher algorithm with the help of example.
3. List and explain different mode of operation used for encryption and decryption.
4. Explain following terms: non-repudiation, integrity, masquerade
5. E xplain playfair cipher. Encrypt the plain-text message “helloe jassmin” using
playfair cipher. Use the keyword “cipherj”. (There is no ‘j’ in the table. Any ‘j’ in the
plaintext is replaced by ‘i’.)
6. Define the following terms related to Information Security: i. Cryptography ii.
Cryptanalysis iii. Sniffing iv. Spoofing v. Interception vi. Fabrication vii. Masquerade
7. Write a note on Advanced Encryption Standard(AES).
8. Define the following terms: (i) Security Attack (ii) Security Services (iii) Security
Mechanism
Assignment-2
1. Explain DES encryption.
2. List and explain possible attacks on DES.
3. Explain key generation of RSA algorithm
4. Write Euclid algorithm.
5. Explain man-in-the middle attack on Diffie-Hellman key exchange.
6. Explain RSA algorithm in detail. Perform encryption and decryption using RSA
algorithm for prime numbers p=3 & q=11, plaintext message m is 2.
7. Discuss Meet-in-the-Middle Attack
Assignment-3
Assignment-4