0% found this document useful (1 vote)
1K views

Assignment 1

This document outlines 12 assignments related to cryptography and network security. The assignments include: 1) Describing attacks on confidentiality, 2) Security services and goals, 3) Security mechanisms, 4) Analyzing the affine Caesar cipher, 5) Encrypting a message with the Playfair cipher, 6) Calculating possible Playfair keys, 7) Encrypting with the Vigenere cipher, 8) Encrypting with the Playfair cipher using a keyword, 9) Analyzing a transposition cipher attack, 10) Decrypting a substitution cipher text, 11) Finding the Hill cipher key matrix, and 12) Encrypting with a one-time pad Vigenere cipher.

Uploaded by

Anish Sachdeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views

Assignment 1

This document outlines 12 assignments related to cryptography and network security. The assignments include: 1) Describing attacks on confidentiality, 2) Security services and goals, 3) Security mechanisms, 4) Analyzing the affine Caesar cipher, 5) Encrypting a message with the Playfair cipher, 6) Calculating possible Playfair keys, 7) Encrypting with the Vigenere cipher, 8) Encrypting with the Playfair cipher using a keyword, 9) Analyzing a transposition cipher attack, 10) Decrypting a substitution cipher text, 11) Finding the Hill cipher key matrix, and 12) Encrypting with a one-time pad Vigenere cipher.

Uploaded by

Anish Sachdeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment -1

Cryptography and Network Security (MC 407)


Department of Applied Mathematics August 2020
Delhi Technological University

1. Describe different types of attacks threatening the confidentiality of information.


2. Describe security services defined by ITU-T (X.800) related to the security goals and attacks.
3. Describe security mechanism recommended by ITU-T (X.800) to provide the security services.
4. A generalization of the Caesar cipher, known as the affine Caesar cipher generates the ciphertext letter C for
any plain text letter P using the formula: 𝐶 = 𝐸([𝑥, 𝑏], 𝑝) = (𝑥𝑝 + 𝑏)𝑚𝑜𝑑26. A basic requirement of any
encryption algorithm is that it be one-to-one. That is, if 𝑝 ≠ 𝑞, then 𝐸(𝑘, 𝑝) ≠ 𝐸(𝑘, 𝑞). Otherwise, decryption
is impossible, because more than one plaintext character maps into the same ciphertext character. The affine
Caesar cipher is not one-to-one for all values of 𝑥. For example, for 𝑥 = 2, and 𝑏 = 3, then 𝐸([𝑥, 𝑏], 0) =
𝐸([𝑥, 𝑏], 13) = 3. In such a case, determine which values of 𝑥are not allowed so that the given cipher is one-
to-one.
5. Using the given Playfair matrix:

M F H I/J K
U N O P Q
Z V W X Y
E L A R G
D S T B C

Encrypt this message: “Must see you over Cadogan West Coming at once”.
6. How many possible keys does the Playfair cipher have? Ignore the fact that some keys might produce identical
encryption results. Now take into account the fact that some Playfair keys produce the same encryption results.
How many effectively unique keys does the Playfair cipher have?
7. Use the Vigenere cipher with keyword “LEG” to encipher the message “explanation”.
8. Use the Playfair cipher to encipher the message “The key is hidden under the door pad”. The secret key can be
made by using the keyword “GUIDENCE”.
9. Eve secretly gets access to Alice’s computer and using her cipher types “abcdefghij”. The screen shows
“CABDEHFGIJ”. If Eve knows that Alice is using a keyed transposition cipher, answer the following questions:
a. What type of attack is eve launching?
b. What is the size of permutation key?
10. The following ciphertext is obtained using a substitution cipher. Give a clearly written description of steps you
followed to decrypt the ciphertext.
EMGLOSUDCGDNCUSWYSFHNSFCYKDPUMLWGYICOXYSIPJCKQPKUGKMGOLICGINC
GACKSNISACYKZSCKXECJCKSHYSXCGOIDPKZCNKSHICGIWYGKKGKGOLDSILKGOIU
SIGLEDSPWZUGFZCCNDGYYSFUSZCNXEOJNCGYEOWEUPXEZGACGNFGLKNSACIGOI
YCKXCJUCIUZCFZCCNDGYYSFEUEKUZCSOCFZCCNCIACZEJNCSHFZEJZEGMXCYHCJU
MGKUCY
(Hint: F decrypts to w)
11. The plaintext “letusmeetnow” and the corresponding ciphertext “HBCDFNOPIKLB” are given. You know that
the algorithm is a Hill cipher, but you don’t know the size of the key. Find the key matrix.
12. Assume a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers
between 0 and 26. For example, if the key is 3, 19, 5..., then the first letter of plaintext is encrypted with a shift
of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. Encrypt the plaintext
“SENDMOREMONEY” with the key stream 9, 0, 1, 7, 23, 15, 21, 14, 11, 11, 2, 8, 9.

End

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy