0% found this document useful (0 votes)
119 views1 page

Module 3 Assignment: How To Solve Vernam Cipher Question

The document contains 6 questions about different cryptography techniques: 1) Using a simple substitution cipher with a key of 10 to encrypt the message "Welcome to Cybersecurity". 2) Decrypting a Caesar cipher ciphertext. 3) Using the Vigenère cipher to decrypt a ciphertext and determine the correct key. 4) Finding possible plaintexts and one-time pads that could produce two given ciphertexts encrypted with the same pad. 5) Encrypting a message using the Playfair cipher. 6) Explaining what a Feistel cipher is and why the Tiny Encryption Algorithm (TEA) is not a Feistel cipher but is "almost" one.

Uploaded by

Naija Advert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views1 page

Module 3 Assignment: How To Solve Vernam Cipher Question

The document contains 6 questions about different cryptography techniques: 1) Using a simple substitution cipher with a key of 10 to encrypt the message "Welcome to Cybersecurity". 2) Decrypting a Caesar cipher ciphertext. 3) Using the Vigenère cipher to decrypt a ciphertext and determine the correct key. 4) Finding possible plaintexts and one-time pads that could produce two given ciphertexts encrypted with the same pad. 5) Encrypting a message using the Playfair cipher. 6) Explaining what a Feistel cipher is and why the Tiny Encryption Algorithm (TEA) is not a Feistel cipher but is "almost" one.

Uploaded by

Naija Advert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IT7020 Cryptography Module

Module 3 Assignment
Solve the following questions
1- Suppose Alice wishes to send the message "Welcome to Cybersecurity" to Bob. Use simple
substitution cipher using n=10 to encrypt the message.

2- Given that the Caesar’s cipher is used, find the plaintext from the ciphertext:
LOLYHLQFLQFLQQDWL

3- Suppose Alice wishes to send the message "HELLO" to Bob, suppose Eve intercepts Alice's
ciphertext: "EQNVZ". If Eve had infinite computing power, she would quickly find that the
key is one of the following:
a. MKFCH
b. XMCKL
c. RTHJS
Could you help Eve to select the correct key? ( Hint: use the Vigenère Cipher to decrypt the
ciphertext to the original message and from you will get the index of each letter of the key.
Finally, convert the indexes into the corresponding letter to find the correct key).

4- Using the letter encodings in the Abbreviated Alphabet table below, the following two
ciphertext messages were encrypted with the same one-time pad cipher
KHHLTK
KTHLLE
Find possible plaintexts for each message and the corresponding one-time pad.

(Please see “How to solve Vernam Cipher question” word file in the “How to do” shared folder)

5- Use the Playfair cipher to encrypt the message "Hide the gold" using the word "Information"
as the key. (Hint: Ignore spaces when encrypting the message i.e. consider the message to be
"HideTheGold ")

6- What is a Feistel Cipher? Why is the Tiny Encryption Algorithm, TEA, not a Feistel Cipher?
Why is TEA “almost” a Feistel Cipher?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy