Dept.
: CS
KPR Institute of Engineering and Technology
(Autonomous)
Avinashi Road, Arasur, Coimbatore - 641 407
Ac.Yr. : 2023 – 2024
Course Code & Title : U21CS601 CRYPTOGRAPHY TECHNIQUES
Year : III Semester : 06 Maximum Marks : 40
ASSIGNMENT II - SET I Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Construct a Playfair Square with keyword “cryptology”. Use this square
1 to encrypt the message: “The British Army used the Playfair Cipher 4 CO1
during World War One.”
Use Vernam Cipher perform encryption for Plain-Text: RAMSWARUPK
2 with Key: RANCHOBABA
2 CO1
Use the Vigenere cipher with keyword “HEALTH” to encipher the
3 message “Life is full of surprises.”
2 CO1
Encrypt the Message “Meet me” using the Hill cipher with the key
4 8 CO1
Show your Calculation and results.
Find the result of multiplying P1 = (x5 + x2 + x) by P2 = (x7 + x4 + x3 + x2
5 + x) in GF (28) with irreducible polynomial (x8 + x4 + x3 + x + 1). 8 CO2
Consider round key 1 in AES
6 8 CO2
Construct round key 2.
Use the Euclidean algorithm to find the greatest common divisor (gcd)
of the following pairs of numbers:
7 a = 96, b = 15, 4 CO3
a = 75 and b = 45
8 Find the value of φ(13). 4 CO3
ASSIGNMENT II - SET 2 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Encrypt "This is the final exam" with Playfair cipher using key
1 "Guidance". Explain the steps involved.
4 CO1
Use Vernam Cipher perform encryption: Input Message = HELLO, Key
2 = MONEY. 2 CO1
Page 1 of 6
Use a railfence cipher with 3 rails – removing the rails from top to
3 bottom – to encrypt the message alan turing the enigma. 2 CO1
Use a Hill cipher to encipher the message “We live in an insecure
world.” Use the following key
4 8 CO1
Determine the gcd of the following pairs of polynomials.
5 (x3 +x+1) and (x2 +1) over GF(3) 8 CO2
(x3 +1) and (x2 +x+1) over GF(2)
Consider
Plaintext: 00 04 12 14 12 04 12 00 0C 00 13 11 08 23 19 19 and
6 Cipher Key: 24 75 A2 B3 34 75 56 88 31 E2 12 00 13 AA 54 87 8 CO2
a. Show the original contents of State, displayed as a 4 * 4 matrix.
b. Show the pre-round key in AES.
Find the multiplicative inverse of 11 in Z26. Use the Extended Euclidean
7 algorithm.
4 CO3
8 Find the value of φ(10). 4 CO3
ASSIGNMENT II - SET 3 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Use Play fair cipher to encrypt the following message “This is a
1 columnar transposition.” Use key APPLE.
4 CO1
Using Vernam cipher method encrypt the word “HELLO”, use the
2 random numbers (23, 12, 2,10, 11).
2 CO1
Try decrypting this message that was encrypted by using a railfence
3 cipher with two rails. TEETN WRTRA HNWSE EOEBA TUSHR ISHBS 2 CO1
KONOO MCIEA DVLPD YRHRC EBU
Encrypt the message “time to study” using a Hill cipher with this key.
4 8 CO1
The Advanced Encryption Standard (AES) uses arithmetic in the finite
field GF (28) with the irreducible polynomial m(x) = X 8+X4+X3+X+1.
5 Consider the two polynomials f(x) = X6+X4+X2+X+1 and g(x) = X7+X+1. 8 CO2
Compute f(x) x G(x).
Answer the following questions about S-boxes in DES:
a. Show the result of passing 110111 through S-box 3.
6 b. Show the result of passing 001100 through S-box 4. 8 CO2
c. Show the result of passing 000000 through S-box 7.
d. Show the result of passing 111111 through S-box 2.
Use the Extended Euclidean algorithm find the modular multiplicative
7 inverse of number a = 27 under modulo b = 5. 4 CO3
8 Find the value of φ(240). 4 CO3
Page 2 of 6
ASSIGNMENT II - SET 4 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Use the Playfair cipher to encipher the message “The key is hidden
under the door pad”. The secret key can be made by filling the first and
1 part of the second row with the word “GUIDANCE” and filling the rest of 4 CO1
the matrix with the rest of the alphabet.
Decrypt the ciphertext “EQNVZ” with key numbers (23, 12, 2,10, 11)
2 using vernam cipher method. 2 CO1
The order of transcription of the columns is determined by the
alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
3 transcribed in order left-to-right. 2 CO1
Encrypt THE QUICK BROWN FOX JUMPED OVER THE LAZY DOG if
the keyword is CORNELL
Using hill cipher encrypt the Plaintext: GFG using the Key:
4 HILLMAGIC. 8 CO1
Calculate the result of the following if the polynomials are over GF (2):
5 (x 4 + x 2 + x + 1) + (x 3 + 1) 8 CO2
(x 4 + x 2 + x + 1) × (x 3 + 1)
Given the plaintext {0F0E0D0C0B0A09080706050403020100} and the
key {02020202020202020202020202020202}:
a. Show the original contents of State, displayed as a 4 * 4 matrix.
6 b. Show the value of State after initial AddRoundKey. 8 CO2
c. Show the value of State after SubBytes.
d. Show the value of State after ShiftRows.
Use the Extended Euclidean algorithm. Let a = 7, m = 26. Find a −1 mod
7 m. 4 CO3
8 Using Fermat’s theorem find 1518 mod 17. 4 CO3
ASSIGNMENT II - SET 5 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Use Play fair cipher to encrypt the following message “COMSEC
1 means communications security. Use key Galois. 4 CO1
find the ciphertext for the following message “go at morning”, use
2 vigenère method, with key “chair”. 2 CO1
3 The order of transcription of the columns is determined by the 2 CO1
Page 3 of 6
alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
transcribed in order left-to-right. Encrypt the message WE ARE
DISCOVERED SAVE YOURSELF with key word AUTHOR
4 Using hill cipher encrypt plain text “COE” use key “ANOTHERBZ” 8 CO1
With polynomial coefficients drawn from GF (2), let us use the
irreducible polynomial x 3 + x + 1 to construct the finite field GF (2 3).
5 Now calculate 8 CO2
(x 2 + x + 1) + (x 2 + 1) =? and (x 2 + x + 1) × (x 2 + 1) =?
Given the plaintext {000102030405060708090A0B0C0D0E0F} and the
key {01010101010101010101010101010101},
a. Show the original contents of State, displayed as a 4 x 4
matrix.
6 8 CO2
b. Show the value of State after initial AddRoundKey.
c. Show the value of State after SubBytes.
d. Show the value of State after ShiftRows.
Using the Euclidean algorithm, find the greatest common divisor of the
following pairs of integers.
7 a. 24 and 320 4 CO3
b. 401 and 700
Using Fermat’s Little Theorem, Find the result of (i) 6 10 mod 11 (ii)
8 312mod 11.
4 CO3
ASSIGNMENT II - SET 6 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Consider the following plaintext: SHE WENT TO THE STORE. Encrypt
1 using Play fair cyber with the keyword “PROBLEMS”. 4 CO1
Find the message (plaintext) for the following ciphertext
2 “DMPYCQGCDWSXHIEI” use vigenère method, with key “LINE”. 2 CO1
The order of transcription of the columns is determined by the
alphabetical order of letters in the keyword. If there are repeated letters
in the keyword, the columns corresponding to those letters are
3 transcribed in order left-to-right. Encrypt the message "MEET ME AT 2 CO1
SEVEN PM IN GATES" (called the "plaintext") with the key
"COMPSCI"
4 Encrypt the Plaintext: ACT with Key: GYBNQKURP using Hill cipher. 8 CO1
Given the following two 3-bit binary code words from GF (2 3) with the
modulus polynomial x 3 + x + 1:
5 B1 = 1 1 1 8 CO2
B2 = 1 0 1
Now calculate: B1 + B2 =? and B1 × B2 =?
Page 4 of 6
Using the Euclidean algorithm, find the greatest common divisor of the
following pairs of integers.
6 a. 88 and 220 8 CO2
b. 300 and 42
7 Find the result of 624 mod 35 using Euler’s Theorem. 4 CO3
Consider the value of State after Shift Rows in AES encryption
scheme.
8 4 CO3
Show the value of State after MixColumns.
ASSIGNMENT II - SET 7 Deadline: 06/03/2024
Q.No. Answer All Questions Marks CO
Consider the Keyword: Gitam University and Plain Text: Gaming
1 academy. Encrypt using play fair cyber.
4 CO1
Use Vigenere Cipher, find cipher text with Key: mask, Plaintext:
2 meetmeatfield. 2 CO1
Using one time pad (Vernam) method, find message (plaintext) for the
3 following ciphertext “QTEZFCWNFGGGJ”, use key numbers (23, 75, 2 CO1
52, 64, 12, 82, 5, 31, 44, 90, 39, 28, 17).
Encrypt the plaintext “friday” using a 2*2 Hill cipher
4 8 CO1
Find the result of (x5 + x2 + x) ⊗ (x7 + x4 + x3 + x2 + x) in GF (28) with
5 irreducible polynomial (x8 + x4 + x3 + x + 1). Note that we use the 8 CO2
symbol ⊗ to show the multiplication of two polynomials.
Consider one-round version of DES encryption. Given the same bit
pattern for the key K and the plaintext, namely:
Hexadecimal notation: 0 1 2 3 4 5 6 7 8 9 A B C D E F
6 a. Derive K1, the first-round subkey. 8 CO2
b. Derive L0, R0.
c. Expand R0 to get E[R0], where E[ # ] is the expansion function.
Use the Euclidean algorithm to compute the GCD of A = 7469 and B =
7 2464 4 CO3
8 Find the result of 2062 mod 77 using Euler’s Theorem. 4 CO3
Page 5 of 6
Page 6 of 6