COMPUTER NETWORK: SECURITY
Numerical for Practice
1. Consider the plaintext “This is a secret message”. Using Rail Fence Cipher, find out the ciphertext for key
value (a)4, (b)2, (c)3.
2. Consider the Ciphertext “ICUEEPSWSMNLDHLIAEOE”. Using the Rail Fence Cipher, find out the plaintext
for key value 2.
3. Using the Rail Fence Cipher, find out the plaintext for key value 2 and CT=
MEMATRHTGPRYETEFETEOAAT.
4. Formulate Caeser cipher for the cipher Text: PHHW PH DIWHU WKH WRJD SDUWB to identify the plain
text with the default key K=3.
5. Decipher HQFUBSWHG WHAW with Caesar cipher key=5.
6. Find the Caesar cipher key if P=party and C=SDUWB. Using the same key encrypt “Computer Network
Security”.
7. Apply Caesar cipher and k=5 to decrypt the given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”.
8. Encrypt the message “hide money” using mono alphabetic cipher. Use the key “tutorials”.
9. Decrypt “TGLDUCH HOTL LSUOLS AGC QRHSHG” using the monoalphabetic keyword “APPALACHIAN
STATE”.
10. Complete the given playfair matrix if PT= EDEEFBHTRBATEC and CT=DMLMTISHBITHGD
B C D
F H I/J K M
N O P Q U
V W X Y Z
11. What will be the plain text if the cipher text is given by “ENNGOHWSTEMEZY” using playfair cipher with
keyword as “SECRET” (assuming j is combined with i)?
12. Encrypt (a) “balloon”, (b) “instruments”, (c) “mosque”, using Playfair cipher with keyword as
“MONARCHY” (assuming j is combined with i).
13. Encrypt “communicate” using Playfair cipher with keyword as “COMPUTER” (assuming j is combined
with i).
14. Decrypt “BPKYFS” using Playfair cipher with keyword as “SECRET” (assuming j is combined with i).
15. Use key: 31452 to decrypt the ciphertext “ETTHEAKIMAOTYCNZNTSG” through columnar ciphering of
one round.
16. Decrypt a cipher text “RIUGS INPCT MSPAL AUNCY SOOCH UEYSA RTE” using a columnar transposition
cipher with a keyword mathematics.
17. Encrypt “attackpostponed” using columnar transposition with key=53412.
18. Encrypt the message “Geeks for Geeks” using Columnar Transposition technique. Consider the key as
HACK. (consider the space as ‘_” special character in the matrix)
19. Encrypt the plain-text “KILL VIRUS AT YOUR OWN RISK” using double round row-column transposition
technique approach where key is 2314 or GOAT.
20. Using the VIGENERE cipher, encrypt the word “encryption” using the word “leg”.
21. Using the VIGENERE cipher, encrypt the word “explanation” using the word “leg”.
22. Encrypt the plaintext “sendmoremoney” with the vernam key stream 8 12 1 7 23 15 21 14 11 19 2 0 9.
23. Encrypt TASTE using Vernam cipher with the key stream as 20 13 29 23 21.
24. In RSA cryptosystem, user D uses two prime numbers, p = 2 and q = 11 to generate a public key. If the
public key of D is 7, then find the private key of D.
25. Perform encryption and decryption using the RSA algorithm, for the following:
(a) p = 3; q = 11; e = 7; M = 5
(b) p = 11; q = 13; e = 11; M = 7
(c) p = 3; q = 7; e = 5; M = 10
26. Find the shared secret key, using Diffie Hellman Algorithm if p=23, g=5 and a=4, b=3.
27. If sender and receiver agree on the prime number and generator as 11 and 2 , respectively. And sender
chooses a as 8 and receiver chooses b as 6, find the shared secret key using the Diffie Hellman Algorithm.
28. Alice and Bob agree to use the prime number p=17 and the generator g=5 for their Diffie-Hellman key
exchange. Alice sends Bob a=2. Bob chooses the random number b=3. What is Alice and Bobs shared
secret?
29. Given a 8-bit input 35 Hex to the given permutation table 5 1 7 3
Find the 8-bit output after permutation in Hex. 6 2 8 4
30. In DES encryption, the 64-bit output of round 16 is 6821345AC821305A Hex. Find the 64-bit input to
inverse initial permutation table.
31. Calculate the first column of the output state matrix of add round key transformation for the given input.
Input state array for add round key transformation =
63 EB 9F A0
C0 2F 93 92
AB 30 AF C7
20 CB 2B A2
Round key=
29 57 40 1A
C3 14 22 02
50 20 99 D7
5F F6 B3 3A