Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Mid-Semester Test
(EC-2 Regular)
A. Considering space as the 27th character in case insensitive English, decrypt the "EQOGBQP"
using Caesar Cipher with k = 2.
B. One of the primitive roots of 19 is 2. Calculate the value of dlog 2, 19 (224).
C. Using the keyword "URI" and the Vigenère Cipher technique, encrypt the message
"NOTERRORISM".
D. How many elements will be present in the set Z1331* ?
E. There are two matrices and . Can they become keys for the Hill Cipher Algorithm?
Which one for which key?
A. Using the keyword "AJITDOVAL" and the Playfair Cipher technique, encrypt the message
"SURGICALSTRIKE". Note that alphabets I and J need to share the same matrix cell.
Page 1 of 2
C. Feistel Ciphering is performed on the plaintext 00101000. The key (K) for all the rounds is
X
selected as 7 and the function Fi for the ith round and input X is defined as Fi(X) = (2.i.K) . No
initial permutation and final swapping are done and mod-15 mathematics is used in all the
calculations. Find out the ciphertext after two rounds.
D. Two hosts agree upon a prime number 499 and one of its primitive roots as 7. The private
random keys they generate are 3 and 4. What shared key will they individually generate
through Diffie-Hellman Key Exchange (DHKE) Algorithm? Answer in the final reduced form.
E. Two prime numbers are selected as p = 41 and q = 17 for the RSA Algorithm. Which one of 32
or 49 would be a valid choice for the public exponent?
**********
Page 2 of 2