You are on page 1of 8

Department:-

School of Computer Science & Engineering

CSE403T: Network Security & Cryptography

Submitted by: Name: Vijendra Singh Section: K2R36 Roll No: A-02 Reg.No: 11105375

Submitted to: Himanshi Ass. Professor

Q. 1 (a) Ans. Unconditionally secure cipher: If the cipher text generated by the scheme does not contain enough information to determine uniquely the corresponding plain text, no matter how much cipher text is available, that scheme is unconditionally secure cipher. Computationally secure cipher: If the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of information, that scheme is computationally secure cipher. (b) Show a play fair cipher in use using a 6*4 matrix, ignoring Q and Z and filling other 24 alphabets, keyword is your First Name and plaintext is I am loving it. Ans. F T E G L V I N B H O W R A C J P X S M D K U Y What is difference between an unconditionally secure and computationally secure cipher?

Decoded text is:- n rt ulwnbf hva

(e) Ans.

Show difference between the block and stream cipher using the same plaintext.

Block ciphers encrypt fixed length blocks of bits, while stream ciphers combine plain-text bits with a pseudorandom cipher bits stream using XOR operation. Even though block ciphers use the same transformation, stream ciphers use varying transformations based on the state of the engine. Stream ciphers usually execute faster than block ciphers. In terms of hardware complexity, stream ciphers are relatively less complex. Stream ciphers are the typical preference over block ciphers when the plain-text is available in varying quantities (for e.g. a secure wifi connection), because block ciphers cannot operate directly on blocks shorter than the block size.

DES is block cipher and one time pad is block cipher.

Q.2

For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

a. b. c.

An organization managing public information on its Web server. A law enforcement organization managing extremely sensitive investigative information. A financial organization managing routine administrative information (not privacy related information).

d.

An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.

e.

A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.

Ans. (a). Security Category of an organization managing public information on its web server: Confidentiality-NA (Not Applicable) Integrity-Moderate Availability-Moderate (b). Security Category of law enforcement organization managing extremely sensitive investigation information: Confidentiality-High Integrity-Moderate Availability-Moderate (c). Security Category of financial organization managing routine administrative information: Confidentiality-Low Integrity-Low Availability-Low (d). Security Category of Contract information: Confidentiality- Moderate Integrity-Moderate Availability-Low Security Category of administrative information: Confidentiality-Low

Integrity-Low Availability-Low

Security Category of Acquisition system: Confidentiality-Moderate Integrity-Moderate Availability-Low (e). Security Category of Sensor data: Confidentiality-NA (Not Applicable) Integrity-High Availability-High Security Category of administrative information: Confidentiality-Low Integrity-Low Availability-Low Security Category of SCADA system: Confidentiality-Low Integrity-High Availability-High

Q. 3

The following cipher text was generated using simple substitution algorithm:

Decrypt the message. Ans. A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out. Of the character 8 there are 33. ; 4 + ) * 5 6 " " " " " " 26. 19. 16. 13. 12. 11.

! 1 0 9 2 : 3 ? ` - .

" " " " " " "

8. 6. 5. 4. 3. 2. 1.

Key: 012345689+!()*;?-`: ---------------------------------------LF BG HAIE M 0 D R S NTU CVY

Cipher text Plaintext

5 3++! 305)) 6* ;48 26)4+.) 4+);80 6* ;48 a good glass in the bishops hostel in the

!8`60) )85 ;]8*;: +*8 !83(88) 5*! ;46(;88* devils sea twenty one degrees and thirteen

96*?;8) *+(;485); 5*! 2: *+(;4 956* 2(5*-4 )8`8*;4 minutes northeast and by north main branch seventh

0692 85); )6!8 )4++; 1(+9 ;48 081; limb east side shoot from the left

8:8 +1 ;48 !85;4)485! 5 288 06*8 1(+9 eye of the deathshead a bee line from

;48 ;(88 ;4(+?34 ;48 )4+; 161;: 188; +?; the tree through the shot fifty feet out

Q.4

Ans. (a) First, pass the 64-bit input through PC-1 to produce a 56-bit result. Then perform a left circular shift separately on the two 28-bit halves. Finally, pass the 56-bit result through PC-2 to produce the 48-bit K1. in binary notation: 0000 1011 0000 0010 0110 0111

1001 1011 0100 1001 1010 0101 in hexadecimal notation: 0 B 0 2 6 7 9 B 4 9 A 5 (b) . L0, R0 are derived by passing the 64-plaintext through IP : L0 = 1100 1100 0000 0000 1100 1100 1111 1111 R0 = 1111 0000 1010 1010 1111 0000 1010 1010 (c). The E table expands R0 to 48 bits: E(R0) = 01110 100001 010101 010101 011110 100001 010101 010101 (d). (e). A = 011100 010001 011100 110010 111000 010101 110011 110000 S100 (1110) = S10(14) = 0 (base 10) = 0000 (base 2) S201(1000) = S21(8) = 12 (base 10) = 1100 (base 2) S300 (1110) = S30(14) = 2 (base 10) = 0010 (base 2) S410 (1001) = S42(9) = 1 (base 10) = 0001 (base 2) S510 (1100) = S52(12) = 6 (base 10) = 0110 (base 2) S601(1010) = S61(10) = 13 (base 10) = 1101 (base 2) S711(1001) = S73(9) = 5 (base 10) = 0101 (base 2) S810 (1000) = S82(8) = 0 (base 10) = 0000 (base 2) (f). (g). B = 0000 1100 0010 0001 0110 1101 0101 0000 Using P(B) = 1001 0010 0001 1100 0010 0000 1001 1100

(h). (i).

R1 = 0101 1110 0001 1100 1110 1100 0110 0011 L1 = R0. The cipher text is the concatenation of L1 and R1.

Q. 5 (a) Using the Playfair Matrix :

T Z E F Ans. L

M V O N G

P W C A H

Q X U B I/J

S Y Encrypt this message: R D K The enemy must be stopped at all costs. Do whatever is necessary. Encrypted message is:

pluzofotvsrqqfrtmeqwtcbfpfizhermtmnrcpfpozeokqfouoqypddr (b) (i) How many possible keys does a Play fair cipher have? Ignore the fact that some keys might produce identical encryption results. Express your answer as an approximate power of 2. Ans. (b) (ii) 25! 2^84 Now take into account the fact that some Play fair cipher keys produce the same encryption results. How many effectively unique keys does the Play fair cipher have? Ans. Given any 5x5 configuration, any of the four row rotations is equivalent, for a total of five equivalent configurations. For each of these five configurations, any of the four column rotations is equivalent. So each configuration in fact represents 25 equivalent configurations. Thus, the total number of unique keys is 25! /25 = 24!

You might also like