[go: up one dir, main page]

0% found this document useful (0 votes)
199 views1 page

Cryptography Assignment Tasks

The document contains 6 questions about different cryptography techniques: 1) Using a simple substitution cipher with a key of 10 to encrypt the message "Welcome to Cybersecurity". 2) Decrypting a Caesar cipher ciphertext. 3) Using the Vigenère cipher to decrypt a ciphertext and determine the correct key. 4) Finding possible plaintexts and one-time pads that could produce two given ciphertexts encrypted with the same pad. 5) Encrypting a message using the Playfair cipher. 6) Explaining what a Feistel cipher is and why the Tiny Encryption Algorithm (TEA) is not a Feistel cipher but is "almost" one.

Uploaded by

Naija Advert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
199 views1 page

Cryptography Assignment Tasks

The document contains 6 questions about different cryptography techniques: 1) Using a simple substitution cipher with a key of 10 to encrypt the message "Welcome to Cybersecurity". 2) Decrypting a Caesar cipher ciphertext. 3) Using the Vigenère cipher to decrypt a ciphertext and determine the correct key. 4) Finding possible plaintexts and one-time pads that could produce two given ciphertexts encrypted with the same pad. 5) Encrypting a message using the Playfair cipher. 6) Explaining what a Feistel cipher is and why the Tiny Encryption Algorithm (TEA) is not a Feistel cipher but is "almost" one.

Uploaded by

Naija Advert
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IT7020 Cryptography Module

Module 3 Assignment
Solve the following questions
1- Suppose Alice wishes to send the message "Welcome to Cybersecurity" to Bob. Use simple
substitution cipher using n=10 to encrypt the message.

2- Given that the Caesar’s cipher is used, find the plaintext from the ciphertext:
LOLYHLQFLQFLQQDWL

3- Suppose Alice wishes to send the message "HELLO" to Bob, suppose Eve intercepts Alice's
ciphertext: "EQNVZ". If Eve had infinite computing power, she would quickly find that the
key is one of the following:
a. MKFCH
b. XMCKL
c. RTHJS
Could you help Eve to select the correct key? ( Hint: use the Vigenère Cipher to decrypt the
ciphertext to the original message and from you will get the index of each letter of the key.
Finally, convert the indexes into the corresponding letter to find the correct key).

4- Using the letter encodings in the Abbreviated Alphabet table below, the following two
ciphertext messages were encrypted with the same one-time pad cipher
KHHLTK
KTHLLE
Find possible plaintexts for each message and the corresponding one-time pad.

(Please see “How to solve Vernam Cipher question” word file in the “How to do” shared folder)

5- Use the Playfair cipher to encrypt the message "Hide the gold" using the word "Information"
as the key. (Hint: Ignore spaces when encrypting the message i.e. consider the message to be
"HideTheGold ")

6- What is a Feistel Cipher? Why is the Tiny Encryption Algorithm, TEA, not a Feistel Cipher?
Why is TEA “almost” a Feistel Cipher?

You might also like