outp

My Cart

You are Here : MASTER DEGREE PROGRAMMES / MSCMACS / MMTE 6
Click Here to Order on WhatsApp
IGNOU MMTE 6 SOLVED ASSIGNMENT

IGNOU MMTE 6 SOLVED ASSIGNMENT


IGNOU MMTE 6 Solved Assignment 2026
Rs. 200
Rs. 123

IGNOU MMTE 6 SOLVED ASSIGNMENT

Rs. 200
Rs. 123

Last Date of Submission of IGNOU MMTE-06 (MSCMACS) 2026 Assignment is for January 2026 Session: 30th September, 2026 (for December 2026 Term End Exam).
Semester Wise
January 2026 Session:
30th March, 2026 (for June 2026 Term End Exam).
July 2026 Session: 30th September, 2026 (for December 2026 Term End Exam).

Title NameIGNOU MMTE 6 SOLVED ASSIGNMENT
TypeSoft Copy (E-Assignment) .pdf
UniversityIGNOU
DegreeMASTER DEGREE PROGRAMMES
Course CodeMSCMACS
Course NameM.Sc. Mathematics with Applications in Computer Science
Subject CodeMMTE 6
Subject NameCryptography
Year2026
Session
LanguageEnglish Medium
Assignment CodeMMTE-06/Assignmentt-1//2026
Product DescriptionAssignment of MSCMACS (M.Sc. Mathematics with Applications in Computer Science) 2026. Latest MMTE 06 2026 Solved Assignment Solutions
Last Date of IGNOU Assignment Submission
Last Date of Submission of IGNOU MMTE-06 (MSCMACS) 2026 Assignment is for January 2026 Session: 30th September, 2026 (for December 2026 Term End Exam).
Semester Wise
January 2026 Session:
30th March, 2026 (for June 2026 Term End Exam).
July 2026 Session: 30th September, 2026 (for December 2026 Term End Exam).

Rs. 200
Rs. 123
Questions Included in this Help Book

Ques 1.

 

Let equation. Find the product of x2 + 2x + 1 + (f(x)) and x2 + 3x - 1 + (f(x)) using the algorithm in page 23, block 1. You should show all the steps as in example 11, page 22, block 1. 

Ques 2.

) Let equation. We represent the field equation by equation. Let us write equation. The table of values is given below:
 

 


i
 

 


γi
 

Vector  


i
 

 


γi
 

Vector
0  


1
 

 


(0,0,0,1)
 

8  


γ2+1
 

 


(0,1,0,1)
 

1  


γ
 

 


(0,0,1,0)
 

9  


γ3+γ
 

 


(1,0,1,0)
 

2  


γ2
 

 


(0,1,0,0)
 

10  


γ2+γ+1
 

 


(0,1,1,1)
 

3  


γ3
 

 


(1,0,0,0)
 

11  


γ3+γ2+γ
 

 


(1,1,1,0)
 

4  


γ+1
 

 


(0,0,1,1)
 

12  


γ3+γ2+γ+1
 

 


(1,1,1,1)
 

5  


γ2+γ
 

 


(0,1,1,0)
 

13  


γ3+γ2+1
 

 


(1,1,0,1)
 

6  


γ3+γ2
 

 


(1,1,0,0)
 

14  


γ3+1
 

 


(1,0,0,1)
 

7  


γ3+γ+1
 

 


(1,0,1,1)
 

     

 

 i) Prepare logarithm and antilogarithm tables as given in page 23 of block 1. 
    ii) Compute equation and equation using the logarithm and antilogarithm tables

Ques 3.

Decrypt each of the following cipher texts:
    i) Text: "CBBGYAEBBFZCFEPXYAEBB", encrypted with affine cipher with key (7,2). 
    ii) Text:"KSTYZKESLNZUV", encrypted with Vigenère cipher with key "RESULT". 
   b) Another version of the columnar transposition cipher is the cipher using a key word. In this cipher, we encrypt as follows: Given a key word, we remove all the duplicate characters in the key word. For example, if the key word is ‘SECRET’, we remove the second ‘E’ and use ‘SECRT’ as the key word. To encrypt, we form a table as follows: In the first row, we write down the key word. In the following rows, we write the plaintext. Suppose we want to encrypt the text ‘ATTACKATDAWN’. We make a table as follows:

S E C R T
A T T A C
K A T D A
W N X X X

 

Then we read off the columns in alphabetical order. We first read the column under ‘C’, followed by the columns under ‘E’, ‘R’, ‘S’ and ‘T’. We get the cipher text TTX TAN ADX AKW CAX. To decrypt, we reverse the process. Note that, since we know the length of the keyword, we can find the length of the columns by dividing the length of the message by the length of the keyword.

 

Given the ciphertext ‘HNDWUEOESSRORUTXLARFASUXTINOOGFNEGASTORX’ and the key word ‘LANCE’, find the plaintext.

Ques 4.

 

Find the inverse of 13 (mod 51) using extended euclidean algorithm.

Ques 5.

 

Use Miller-Rabin test to check whether 75521 is a strong pseuodprime to the base 2.

Ques 6.

In this exercise, we introduce you to Hill cipher. In this cipher, we convert our message to numbers, just as in affine cipher. However, instead of encrypting character by character, we encrypt pairs of characters by multiplying them with an invertible matrix with co-efficients in Z26.

 

Here is an example: Suppose we want to ENCRYPT "ALLISWELL". Since we require the plaintext to have even number of characters, we pad the message with the character ‘X’. We break up the message into pairs of characters AL, LI, SW, EL and LX. We convert each pair of characters into a pair elements in Z26 as follows:

 

equation\underline{\overline{\begin{aligned}AL&\quad(0,11)\\LI&\quad(11,8)\\SW&\quad(18,22)\\EL&\quad(4,11)\\LX&\quad(11,23)\end{aligned}}}">

 

Next, we choose an invertible equation matrix with coefficients in equation, for example, equation.
This matrix has determinant equation and equation is a unit in equation with inverse equation. We write each pair of elements in equation as a column vector and multiply it by A:
equation
We then convert each pair of numbers to a pair of characters and write them down. In this example, we get the cipher text "LSPFYGXUEN" corresponding to the plain text "ALLWELL". To decrypt, we convert pairs of characters to pairs of numbers and multiply by equation and we have
equation
Decrypt the text "TWDXHUJLUENN" which was encrypted using the Hill’s cipher with the matrix equation as the encryption matrix.

Ques 7.

 Decrypt the ciphertext 101000111001 which was encrypted with the Toy block cipher once using the key 101010010. Show all the steps. 
b) A 64 bit key for the DES is given below
equation 11000111 equation 10000101
equation 11110111 equation 11000001
equation 11111011 equation 10101011
equation 10011101 equation 10010001
equation i) Check whether the key is error free using the parity bits.

Ques 8.

 

Find the keys for the second round.
6) a) Considering the bytes 10001001 and 10101010 as elements of the field equation, where g(X) is the polynomial X8 + X4 + X3 + X + 1, find their product and quotient. 

Ques 9.

 Find a recurrence that generates the sequence 110110110110110. 

Ques 10.

 Apply the frequency test, serial test and autocorrelation test to the following sequence at level of significance equation:

 011001110000110010011100. 

Ques 11.

Apply poker test to the following sequence with level of significance equation.
equation 1001101000010000101111011
equation 01110100101101100100110. 

Ques 12.

 Apply runs test to the following sequence:

 1001101000010000101111011
equation 0111010010110110010011010
equation 0110011100001100100111000
equation 1100001101010111101001110
equation 0010001111000001101010010
equation 1000110100000110100101101
equation 1110001001 

Ques 13.

 Decrypt the message equation that was encrypted using RSA algorithm with equation and equation

Ques 14.

 

Bob uses ElGamal cryptosystem with parameters equationequation and the secret value equation. What values will he make public? 

Ques 15.

 

 Alice wants to send Bob the message equation. She chooses equation. How will she compute the cipher text? What information does she send to Bob? 

Ques 16.

Explain how Bob will decrypt the message. 
9) a) Solve the discrete logarithm problem equation using Baby-Step, Giant-Step algorithm. 

Ques 17.

Alice wants to use the ElGamal digital signature scheme with public parameters equationequation, secret value equation and equation. She wants to sign the message equation and send it to Bob. She chooses equation as the secret value. Explain the procedure that Alice will use for computing the signature of the message. What information will she send Bob? 

Ques 18.

 Alice wants to use the Digital Signature algorithm for signing messages. She chooses equationequationequation and equation. Alice wants to sign the message equation. She chooses the secret value equation. Explain the procedure that Alice will use for computing the signature. What information will she send Bob? 

Ques 19.

 

Let equation. Find the product of x2 + 2x + 1 + (f(x)) and x2 + 3x - 1 + (f(x)) using the algorithm in page 23, block 1. You should show all the steps as in example 11, page 22, block 1. 

Ques 20.

) Let equation. We represent the field equation by equation. Let us write equation. The table of values is given below:
 

 


i
 

 


γi
 

Vector  


i
 

 


γi
 

Vector
0  


1
 

 


(0,0,0,1)
 

8  


γ2+1
 

 


(0,1,0,1)
 

1  


γ
 

 


(0,0,1,0)
 

9  


γ3+γ
 

 


(1,0,1,0)
 

2  


γ2
 

 


(0,1,0,0)
 

10  


γ2+γ+1
 

 


(0,1,1,1)
 

3  


γ3
 

 


(1,0,0,0)
 

11  


γ3+γ2+γ
 

 


(1,1,1,0)
 

4  


γ+1
 

 


(0,0,1,1)
 

12  


γ3+γ2+γ+1
 

 


(1,1,1,1)
 

5  


γ2+γ
 

 


(0,1,1,0)
 

13  


γ3+γ2+1
 

 


(1,1,0,1)
 

6  


γ3+γ2
 

 


(1,1,0,0)
 

14  


γ3+1
 

 


(1,0,0,1)
 

7  


γ3+γ+1
 

 


(1,0,1,1)
 

     

 

 i) Prepare logarithm and antilogarithm tables as given in page 23 of block 1. 
    ii) Compute equation and equation using the logarithm and antilogarithm tables

Ques 21.

Decrypt each of the following cipher texts:
    i) Text: "CBBGYAEBBFZCFEPXYAEBB", encrypted with affine cipher with key (7,2). 
    ii) Text:"KSTYZKESLNZUV", encrypted with Vigenère cipher with key "RESULT". 
   b) Another version of the columnar transposition cipher is the cipher using a key word. In this cipher, we encrypt as follows: Given a key word, we remove all the duplicate characters in the key word. For example, if the key word is ‘SECRET’, we remove the second ‘E’ and use ‘SECRT’ as the key word. To encrypt, we form a table as follows: In the first row, we write down the key word. In the following rows, we write the plaintext. Suppose we want to encrypt the text ‘ATTACKATDAWN’. We make a table as follows:

S E C R T
A T T A C
K A T D A
W N X X X

 

Then we read off the columns in alphabetical order. We first read the column under ‘C’, followed by the columns under ‘E’, ‘R’, ‘S’ and ‘T’. We get the cipher text TTX TAN ADX AKW CAX. To decrypt, we reverse the process. Note that, since we know the length of the keyword, we can find the length of the columns by dividing the length of the message by the length of the keyword.

 

Given the ciphertext ‘HNDWUEOESSRORUTXLARFASUXTINOOGFNEGASTORX’ and the key word ‘LANCE’, find the plaintext.

Ques 22.

 

Find the inverse of 13 (mod 51) using extended euclidean algorithm.

Ques 23.

 

Use Miller-Rabin test to check whether 75521 is a strong pseuodprime to the base 2.

Ques 24.

In this exercise, we introduce you to Hill cipher. In this cipher, we convert our message to numbers, just as in affine cipher. However, instead of encrypting character by character, we encrypt pairs of characters by multiplying them with an invertible matrix with co-efficients in Z26.

 

Here is an example: Suppose we want to ENCRYPT "ALLISWELL". Since we require the plaintext to have even number of characters, we pad the message with the character ‘X’. We break up the message into pairs of characters AL, LI, SW, EL and LX. We convert each pair of characters into a pair elements in Z26 as follows:

 

equation\underline{\overline{\begin{aligned}AL&\quad(0,11)\\LI&\quad(11,8)\\SW&\quad(18,22)\\EL&\quad(4,11)\\LX&\quad(11,23)\end{aligned}}}">

 

Next, we choose an invertible equation matrix with coefficients in equation, for example, equation.
This matrix has determinant equation and equation is a unit in equation with inverse equation. We write each pair of elements in equation as a column vector and multiply it by A:
equation
We then convert each pair of numbers to a pair of characters and write them down. In this example, we get the cipher text "LSPFYGXUEN" corresponding to the plain text "ALLWELL". To decrypt, we convert pairs of characters to pairs of numbers and multiply by equation and we have
equation
Decrypt the text "TWDXHUJLUENN" which was encrypted using the Hill’s cipher with the matrix equation as the encryption matrix.

Ques 25.

 Decrypt the ciphertext 101000111001 which was encrypted with the Toy block cipher once using the key 101010010. Show all the steps. 
b) A 64 bit key for the DES is given below
equation 11000111 equation 10000101
equation 11110111 equation 11000001
equation 11111011 equation 10101011
equation 10011101 equation 10010001
equation i) Check whether the key is error free using the parity bits.

Ques 26.

 

Find the keys for the second round.
6) a) Considering the bytes 10001001 and 10101010 as elements of the field equation, where g(X) is the polynomial X8 + X4 + X3 + X + 1, find their product and quotient. 

Ques 27.

 Find a recurrence that generates the sequence 110110110110110. 

Ques 28.

 Apply the frequency test, serial test and autocorrelation test to the following sequence at level of significance equation:

 011001110000110010011100. 

Ques 29.

Apply poker test to the following sequence with level of significance equation.
equation 1001101000010000101111011
equation 01110100101101100100110. 

Ques 30.

 Apply runs test to the following sequence:

 1001101000010000101111011
equation 0111010010110110010011010
equation 0110011100001100100111000
equation 1100001101010111101001110
equation 0010001111000001101010010
equation 1000110100000110100101101
equation 1110001001 

Ques 31.

 Decrypt the message equation that was encrypted using RSA algorithm with equation and equation

Ques 32.

 

Bob uses ElGamal cryptosystem with parameters equationequation and the secret value equation. What values will he make public? 

Ques 33.

 

 Alice wants to send Bob the message equation. She chooses equation. How will she compute the cipher text? What information does she send to Bob? 

Ques 34.

Explain how Bob will decrypt the message. 
9) a) Solve the discrete logarithm problem equation using Baby-Step, Giant-Step algorithm. 

Ques 35.

Alice wants to use the ElGamal digital signature scheme with public parameters equationequation, secret value equation and equation. She wants to sign the message equation and send it to Bob. She chooses equation as the secret value. Explain the procedure that Alice will use for computing the signature of the message. What information will she send Bob? 

Ques 36.

 Alice wants to use the Digital Signature algorithm for signing messages. She chooses equationequationequation and equation. Alice wants to sign the message equation. She chooses the secret value equation. Explain the procedure that Alice will use for computing the signature. What information will she send Bob? 

Rs. 200
Rs. 123
Details
  • Latest IGNOU Solved Assignment
  • IGNOU MMTE 6 2026 Solved Assignment
  • IGNOU 2026 Solved Assignment
  • IGNOU MSCMACS M.Sc. Mathematics with Applications in Computer Science 2026 Solved Assignment
  • IGNOU MMTE 6 Cryptography 2026 Solved Assignment

Looking for IGNOU MMTE 6 Solved Assignment 2026. You are on the Right Website. We provide Help book of Solved Assignment of MSCMACS MMTE 6 - Cryptographyof year 2026 of very low price.
If you want this Help Book of IGNOU MMTE 6 2026 Simply Call Us @ 9199852182 / 9852900088 or you can whatsApp Us @ 9199852182
 

IGNOU MSCMACS Assignments Jan - July 2025 - IGNOU University has uploaded its current session Assignment of the MSCMACS Programme for the session year 2026. Students of the MSCMACS Programme can now download Assignment questions from this page. Candidates have to compulsory download those assignments to get a permit of attending the Term End Exam of the IGNOU MSCMACS Programme.

Download a PDF soft copy of IGNOU MMTE 6 Cryptography MSCMACS Latest Solved Assignment for Session January 2025 - December 2025 in English Language.

If you are searching out Ignou MSCMACS  MMTE 6 solved assignment? So this platform is the high-quality platform for Ignou MSCMACS  MMTE 6 solved assignment. Solved Assignment Soft Copy & Hard Copy. We will try to solve all the problems related to your Assignment. All the questions were answered as per the guidelines. The goal of IGNOU Solution is democratizing higher education by taking education to the doorsteps of the learners and providing access to high quality material. Get the solved assignment for MMTE 6 Cryptography course offered by IGNOU for the year 2026.Are you a student of high IGNOU looking for high quality and accurate IGNOU MMTE 6 Solved Assignment 2026 English Medium? 

Students who are searching for IGNOU M.Sc. Mathematics with Applications in Computer Science (MSCMACS) Solved Assignments 2026 at low cost. We provide all Solved Assignments, Project reports for Masters & Bachelor students for IGNOU. Get better grades with our assignments! ensuring that our IGNOU M.Sc. Mathematics with Applications in Computer Science Solved Assignment meet the highest standards of quality and accuracy.Here you will find some assignment solutions for IGNOU MSCMACS Courses that you can download and look at. All assignments provided here have been solved.IGNOU MMTE 6 SOLVED ASSIGNMENT 2026. Title Name MMTE 6 English Solved Assignment 2026. Service Type Solved Assignment (Soft copy/PDF).

Are you an IGNOU student who wants to download IGNOU Solved Assignment 2024? IGNOU MASTER DEGREE PROGRAMMES Solved Assignment 2023-24 Session. IGNOU Solved Assignment and In this post, we will provide you with all solved assignments.

If you’ve arrived at this page, you’re looking for a free PDF download of the IGNOU MSCMACS Solved Assignment 2026. MSCMACS is for M.Sc. Mathematics with Applications in Computer Science.

IGNOU solved assignments are a set of questions or tasks that students must complete and submit to their respective study centers. The solved assignments are provided by IGNOU Academy and must be completed by the students themselves.

Course Name M.Sc. Mathematics with Applications in Computer Science
Course Code MSCMACS
Programm MASTER DEGREE PROGRAMMES Courses
Language English

 

 

 
IGNOU MMTE 6 Solved Assignment                                       
ignou assignment 2026,   2026 MMTE 6
IGNOU MMTE 6 Assignment
ignou solved assignment MMTE 6
MMTE 6 Assignment 2026
solved assignment MMTE 6
MMTE 6 Assignment 2026
assignment of ignou MMTE 6
Download IGNOU MMTE 6 Solved Assignment 2026
ignou assignments MMTE 6
 
 
Ignou result MMTE 6
Ignou Assignment Solution MMTE 6
 

 



Comments