This document outlines 20 topics related to cryptography and network security that will be covered in the course CS 8792. Some of the topics include comparing active and passive attacks, explaining different ciphers like DES, AES, Playfair and Hill ciphers, cryptanalysis techniques, public key cryptography, and network security models. Algebraic concepts like fields, rings and modular arithmetic are also discussed alongside cryptographic algorithms, encryption modes, and cryptanalysis methods.
This document outlines 20 topics related to cryptography and network security that will be covered in the course CS 8792. Some of the topics include comparing active and passive attacks, explaining different ciphers like DES, AES, Playfair and Hill ciphers, cryptanalysis techniques, public key cryptography, and network security models. Algebraic concepts like fields, rings and modular arithmetic are also discussed alongside cryptographic algorithms, encryption modes, and cryptanalysis methods.
This document outlines 20 topics related to cryptography and network security that will be covered in the course CS 8792. Some of the topics include comparing active and passive attacks, explaining different ciphers like DES, AES, Playfair and Hill ciphers, cryptanalysis techniques, public key cryptography, and network security models. Algebraic concepts like fields, rings and modular arithmetic are also discussed alongside cryptographic algorithms, encryption modes, and cryptanalysis methods.
This document outlines 20 topics related to cryptography and network security that will be covered in the course CS 8792. Some of the topics include comparing active and passive attacks, explaining different ciphers like DES, AES, Playfair and Hill ciphers, cryptanalysis techniques, public key cryptography, and network security models. Algebraic concepts like fields, rings and modular arithmetic are also discussed alongside cryptographic algorithms, encryption modes, and cryptanalysis methods.
2. Find gcd(1970,1066) using Euclid’s algorithm. 3. Brief the strengths of DES. 4. Give the five modes of operation of block cipher. 5. Define field and ring in algebraic structure. 6. What is meant by Denial of Service attack? Is it Active or Passive attack? 7. Find Residues of 6 when n=8. 8. Specify the components of Encryption algorithm. 9. Define Cryptanalysis. 10. Define Steganography. 11. Explain OSI Security Architecture model with neat diagram. 12. a) Describe the model for Network Security with neat sketch. b) Use Playfair cipher to encrypt the message “THE HOUSE IS BEING SOLD TONIGHT” with the key “GUIDANCE”. Discuss the rules to be followed. 13. Describe in detail about the types of Cryptanalytic attack. 14. a) Discuss about different Polyalphabetic Substitution Techniques with an example. b) Difference between Monoalphabetic and Polyalphabetic ciphers. 15. a) Demonstrate the encryption of the message “PAY” using hill cipher with the following key matrix and show the decryption. K= |17 17 5| |21 18 21| |2 2 19| b) Find gcd(240,46) using Extended Eulicd’s Algorithm. 16. a) Elaborate the following: i) Perfect security ii) Information theory iii) Product cryptosystem b) Calculate the cipher text using one time pad cipher Plain text: ROCK & Keyword: BOTS 17. a) Given 10 bit key k=1010000010, Determine k1,k2 where p10= 3 5 2 7 4 10 1 9 8 6 and p8= 6 3 7 4 8 5 10 9 by using SDES key generation method. b) Does the set of residue classes modulo 3 forms a group with respect to addition and multiplication. 18. Explain the following with an example i)Caesar cipher ii) Railfence iii) Columnar cipher 19. Describe DES algorithm with neat diagram and explain the steps. 20. What do you mean by AES? Diagrammatically illustrate the structure of AES and describe the steps in AES encryption process.