Professional Documents
Culture Documents
NET311 - Sheet1 PDF
NET311 - Sheet1 PDF
NET311 - Sheet1 PDF
Question 1:
A. Encrypt the following message using transposition cipher based on the key
shown below:
Answer: NFIRMOTIANSOCUEITRZZY
Answer: NWLAHYC
Answer: JXPQBO
1
Princess Nourah Bint Abdul Rahman University
College of Computer and Information Sciences
Information Technology Department
Information Security (NET 311)
Sheet#1 (Symmetric Key Encryption)
Question 2:
A. In DES, if M = 6000 3000 0800 0020 (Hex), Find the IP(M).
Original M IP(M)
B. Using the S-box shown below, What is the output if the input was: 010011
and 111001
2
Princess Nourah Bint Abdul Rahman University
College of Computer and Information Sciences
Information Technology Department
Information Security (NET 311)
Sheet#1 (Symmetric Key Encryption)
C. In the first step in the function F of the DES encryption, the 32-bit right side
is expanded in an expansion permutation to get a 48-bit output. Use the
expansion permutation below on the message :
R2= 0110 1001 0111 1010 1011 0010 1010 1110
Answer (binary): 001101 010010 101111 110101 010110 100101 010101 011100
D. In the step of creating the sub key for the 4th round, C3 and D3 will be shifted
to the left. Find the result of C4 and D4.
C3 = 1001110010101010111100001111
D3 = 1101111010010101100110011111
C4= 0111001010101011110000111110
D4= 0111101001010110011001111111
3
Princess Nourah Bint Abdul Rahman University
College of Computer and Information Sciences
Information Technology Department
Information Security (NET 311)
Sheet#1 (Symmetric Key Encryption)
Question 3:
A. Encrypt the following message “HI” By Using RSA algorithm.
Assume that P = 11 and Q = 13., and e= 3
= 2 * 143 = 286
= 343 – 286 = 57
= 3 * 143 = 429
= 512 – 429 = 83
4
Princess Nourah Bint Abdul Rahman University
College of Computer and Information Sciences
Information Technology Department
Information Security (NET 311)
Sheet#1 (Symmetric Key Encryption)
B. Alice and Bob exchange a shift cipher key using the Diffie-Hellman key
exchange. They agree to use the prime p = 11 and g = 7
(a) Assume Alice uses the secret value a = 6 and Bob the secret value b = 9.
Compute the intermediate values and the final key that Alice and Bob exchange
GOOD LUCK