Vous êtes sur la page 1sur 2

1. Alice meets bob and says Rjjy rj ts ymi xfggfym.

Bi
bnqq inxhzxx ymj uqfs. Is she is using Caesar cipher,
what is she trying to convey?
2. What would be the transformation of message
Happy Birthday to you using Rail Fence Technique.
3. Consider a scheme involving the replacement of
alphabets
Original A B C . X Y Z
Changed to Z Y X . C B A
4. Define the type of security attack in each of the
following cases
a) A student breaks in to a professors office to obtain
a copy of the next days Test.
b)A student gives a check for $10 to buy a used
book. Later she finds that the check was cashed
for $100
c) A student sends hundreds of e-mails per day to
another student using a phony return email
address
5. Which Technique (cryptography or steganography) is
used in the following cases for confidentiality?
a) A student write the answers to a test on a small
piece of paper, rolls up the paper, and inserts it in
a ball point pen, and passes pen to another
student.
b)To send a message, a spy replaces each character
in the message with a symbol that was agreed
upon in advance as the characters replacement
c) A company uses special ink on its check to prevent
forgeries
d) A graduate student uses watermark to protect her
thesis, which is posted on her website.
6. Using Vigenere cipher encrypt the word
cryptography using the key house.
7. Perform encryption and decryption using Hill Cipher
Plain Text- CAT

( )
6 24 1
Key- 13 16 10
20 17 15

Vous aimerez peut-être aussi