0% found this document useful (0 votes)
436 views2 pages

Ccns Assignment 1

1. Alice is using a Caesar cipher to convey a message to Bob about a plan. 2. The message "Happy Birthday to you" would be encrypted using the Rail Fence Technique. 3. A security scheme involves replacing each alphabet with another alphabet in a consistent way such as A=Z, B=Y, etc.

Uploaded by

api-347898644
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
436 views2 pages

Ccns Assignment 1

1. Alice is using a Caesar cipher to convey a message to Bob about a plan. 2. The message "Happy Birthday to you" would be encrypted using the Rail Fence Technique. 3. A security scheme involves replacing each alphabet with another alphabet in a consistent way such as A=Z, B=Y, etc.

Uploaded by

api-347898644
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1. Alice meets bob and says Rjjy rj ts ymi xfggfym.

Bi
bnqq inxhzxx ymj uqfs. Is she is using Caesar cipher,
what is she trying to convey?
2. What would be the transformation of message
Happy Birthday to you using Rail Fence Technique.
3. Consider a scheme involving the replacement of
alphabets
Original A B C . X Y Z
Changed to Z Y X . C B A
4. Define the type of security attack in each of the
following cases
a) A student breaks in to a professors office to obtain
a copy of the next days Test.
b)A student gives a check for $10 to buy a used
book. Later she finds that the check was cashed
for $100
c) A student sends hundreds of e-mails per day to
another student using a phony return email
address
5. Which Technique (cryptography or steganography) is
used in the following cases for confidentiality?
a) A student write the answers to a test on a small
piece of paper, rolls up the paper, and inserts it in
a ball point pen, and passes pen to another
student.
b)To send a message, a spy replaces each character
in the message with a symbol that was agreed
upon in advance as the characters replacement
c) A company uses special ink on its check to prevent
forgeries
d) A graduate student uses watermark to protect her
thesis, which is posted on her website.
6. Using Vigenere cipher encrypt the word
cryptography using the key house.
7. Perform encryption and decryption using Hill Cipher
Plain Text- CAT

( )
6 24 1
Key- 13 16 10
20 17 15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy