Cryptography & N/W security Assignment 1
Last Date for Submission 24/12/2022
(Don’t wait for last date)
1. Differentiate between computationally secure cipher and unconditionally
secure cipher. Write examples with reasoning.
2. Which parameters and design choices determine the actual
algorithm of a Fiestel Cipher
3. Encrypt the message “this is an exercise” using the additive Cipher with
key=20
4. What is the necessity of block cipher modes of operation?
5. Discuss digital signature scheme using RSA.
6. Why the attacker is not able to recognize the actual sender of the message in
encrypted tunnels?
7. How key generation is done in DES.
8. Illustrate the working of SHA-1 with diagrams.
9. What are the Security Requirements of message authentication?
10. Explain the method of protecting IP datagram from replay attack using
IPsec.
11. Explain the sequence of steps used in Secure Socket Layer handshake
Protocol for establishing a new session. Draw a diagram which shows the
action of Handshake Protocol.
12. Explain confusion and diffusion properties of modern block ciphers.
13. Differentiate between symmetric and asymmetric cryptosystem.
14. What are the requirements of a good hash function
15. How digital signature is implemented using RSA approach
16. List the various attacks that can be made on packet filtering routers and
mention appropriate counter measures
17. Differiante between monoalphabetic and polyalphabetic ciphers with example
18. Explain the S-box design of DES algorithm.
19. Explain the key generation in AES algorithm
20. How signing and verification is done in Digital Signature algorithm
21. Illustrate Elliptic Curve Encryption/Decryption
22. Discuss about the various types of firewalls
23. Explain the role of Security Association and SA selectors in IPSec
24. Explain the various protocols used in SSL
25. Explain the construction of dual signature in SET protocol