Information Security Hourly 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Hourly Exam Spring-2021

Faculty of Engineering Sciences and Technology

Subject: Information Security Submission Day: Thursday


Instructor: Ali Ahmad Siddiqui Submission Date: 04/08/21
Program: BSCS Max. Marks: 15

Please follow the instructions carefully:

1. Write your answers directly on the Black Board (recommended) or upload word file before the
due date on Blackboard.
2. Write your name and registration ID on the first page of your Word file.
3. Answer scripts can only be uploaded on Blackboard only during the submission time.
4. To avoid any unforeseen problems, you are advised to follow the Guide lines communicated by
the Faculty Members.
5. Submission of answer copy(ies) will be considered acceptable through Blackboard only.
Therefore, do not submit your document through email or any other medium.
6. Use 12 pt. font size and Times New Roman font style along with 1-inch page margins.
7. Follow the requirements of the word limit and the marking criteria while writing your answers.
8. Provide relevant, original and conceptual answers, as this exam aims to test your ability to
examine, explain, modify or develop concepts discussed in class.
9. Do not copy answers from the internet or other sources. The plagiarism of your answers may be
checked through Turnitin.
10. Double check your word file before uploading it on BlackBoard to ensure that you have uploaded
the correct file with your answers.
Question #1
Consider the key: ‘Thequickbrown’. Use the Playfair cipher to encrypt your “First name, Last
name” without space. For example if the name is “Harry Potter”, the plain text would be
“HarryPotter”. Show all the steps.

Question #2
Using “The Rail Fence Cipher” encrypt the following plain text with Depth 4. Show all the steps
Plain Text: “Iqra university is ranked number one”

Question #3
A file of 10 Megabytes is encrypted using an 8bit symmetric key. Receiver decrypts the file at
100Kbits/sec. How long an attacker will take to break the key by using brute force attack?
Calculate the total time in Days, hours and minutes (Consider 1GB = 1000MB)

Question #4
How an Asymmetric key algorithm is used for both data encryption and authenticity. Discuss.
Why AES is considered more secure then DES?

Question #5
User A sends a data to User B. How user A can make sure that the data would not be read by any
intruder in transit? And also how he can prove that the data is sent by him not anyone else.
Elaborate.

You might also like