Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(a) What is difference between an unconditionally secure and computationally secure cipher?
Ans.
Unconditionally secure cipher: If the cipher text generated by the scheme does not contain
enough information to determine uniquely the corresponding plain text, no matter how much
cipher text is available, that scheme is unconditionally secure cipher.
Computationally secure cipher: If the cost of breaking the cipher exceeds the value of the
encrypted information and the time required to break the cipher exceeds the useful lifetime of
information, that scheme is computationally secure cipher.
(b) Show a play fair cipher in use using a 6*4 matrix, ignoring Q and Z and filling other 24
alphabets, keyword is your ”First Name” and plaintext is “I am loving it”.
Ans.
F I R S
T N A M
E B C D
G H J K
L O P U
V W X Y
(e) Show difference between the block and stream cipher using the same plaintext.
Ans.
Block ciphers encrypt fixed length blocks of bits, while stream ciphers combine plain-text bits
with a pseudorandom cipher bits stream using XOR operation.
Even though block ciphers use the same transformation, stream ciphers use varying
transformations based on the state of the engine.
Stream ciphers usually execute faster than block ciphers.
In terms of hardware complexity, stream ciphers are relatively less complex.
Stream ciphers are the typical preference over block ciphers when the plain-text is available in
varying quantities (for e.g. a secure wifi connection), because block ciphers cannot operate
directly on blocks shorter than the block size.
DES is block cipher and one time pad is block cipher.
Q.2 For each of the following assets, assign a low, moderate, or high impact level for the loss of
confidentiality, availability, and integrity, respectively. Justify your answers.
Q. 3 The following cipher text was generated using simple substitution algorithm:
Ans. A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen
minutes northeast and by north main branch seventh limb east side shoot from the
left eye of the death's-head a bee line from the tree through the shot fifty feet out.
Key:
012345689+!()*;?-`:
----------------------------------------
LF BG HAIE M 0 D R S NTU CVY
Ans.
(a) First, pass the 64-bit input through PC-1 to produce a 56-bit result. Then perform a left circular
shift separately on the two 28-bit halves. Finally, pass the 56-bit result through PC-2 to produce
the 48-bit K1.
in binary notation: 0000 1011 0000 0010 0110 0111
1001 1011 0100 1001 1010 0101
in hexadecimal notation: 0 B 0 2 6 7 9 B 4 9 A 5
Q. 5
T M P Q S
Z V W X Y
Encrypt this message:
E O C U R
“The enemy must be stopped at all costs. Do
F N A B D whatever is necessary.”
pluzofotvsrqqfrtmeqwtcbfpfizhermtmnrcpfpozeokqfouoqypddr
(b) (i) How many possible keys does a Play fair cipher have? Ignore the fact that some keys might
produce identical encryption results. Express your answer as an approximate power of 2.
(b) (ii) Now take into account the fact that some Play fair cipher keys produce the same
encryption results. How many effectively unique keys does the Play fair cipher have?
Ans. Given any 5x5 configuration, any of the four row rotations is equivalent, for a total of five
equivalent configurations. For each of these five configurations, any of the four column rotations
is equivalent. So each configuration in fact represents 25 equivalent configurations. Thus, the
total number of unique keys is 25! /25 = 24!