0% found this document useful (0 votes)
23 views1 page

CNS Assignment

The document contains 3 assignments on topics related to cryptography and network security. Assignment 1 includes explaining different types of attacks, encrypting a message using Hill Cipher and Playfair cipher. Assignment 2 covers DES, AES, double DES, and block cipher modes of operation. Assignment 3 includes SHA-512, MAC algorithms, DSA, public key distribution, X.509 certificates, Kerberos, and SSL.

Uploaded by

vishaldamor956
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views1 page

CNS Assignment

The document contains 3 assignments on topics related to cryptography and network security. Assignment 1 includes explaining different types of attacks, encrypting a message using Hill Cipher and Playfair cipher. Assignment 2 covers DES, AES, double DES, and block cipher modes of operation. Assignment 3 includes SHA-512, MAC algorithms, DSA, public key distribution, X.509 certificates, Kerberos, and SSL.

Uploaded by

vishaldamor956
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Sardar Vallbhbhai Patel Institute of Technology,VASAD

Information Technology Department


Subject: CNS (3161606)
Academic Year: 2023-2024(Even)

Assignment – 1
1) Explain different Types of attacks in details.
2) Encrypt the message “security” using Hill Cipher with key (9 4 5 7 )
3) Construct a Play fair matrix with the key “Constitution”. And encrypt the message
“The document contains the fundamental rights of the people”.
4) Find out the greatest common divisor GCD of 96256 and 432.

Assignment – 2
1) Explain Single round of DES in detail.
2) Explain s-box generation in AES.
3) Explain double DES. How it is vulnerable to meet-in-the-middle attack.
4) Discuss need of block cipher mode of operations. Also explain various block cipher
mode of operations.
5) Calculate private key using RSA algorithm. With values P=11 ,Q=5 ,E=7 Also encrypt
plaint text m=4 and generate cipher text.

Assignment –3
1) Write down steps and draw figure for SHA-512.
2) Explain MAC based of cipher blocks (DAA and CMAC).
3) Draw the figure for DSA signing and verification.
4) Explain different approaches of distribution of Public Keys.
5) Explain various fields in X.509 certificate format.
6) Give overview of Kerberos.
7) Explain SSL protocol stack.

You might also like