[go: up one dir, main page]

0% found this document useful (0 votes)
106 views5 pages

Symmetric Encryption Q&A Guide

Doc

Uploaded by

mwaijegakelvin9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views5 pages

Symmetric Encryption Q&A Guide

Doc

Uploaded by

mwaijegakelvin9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

REVIEW QUESTIONS AND SOLUTIONS FOR VARIOUS SYMMETRIC

ENCRYPTION ALGORITHMS

QN1: Using the matrix (m*n) = (6*5), decrypt the following cipher-text phrase
“SIVMABETEPNJCYROTEUIYRSCRSITUT” into plain text

Solution

S E C U R
I T Y I S
V E R Y I
M P O R T
A N T S U
B J E C T

SECURITY IS VERY IMPORTANT SUBJECT

QN2: Using Rail fence transposition algorithm, encrypt the phrase “INSTITUTE OF
ACCOUNTANCY ARUSHA GRADUATES” with the key = 5.

Solution

Cipher-text: IENUU NTOUTRSOA SUFOAAHAT TTUCNYARE ICCGS

QN3: Using the Vigenère Cipher table, encrypt the following plaintext phrase “WE ARE
DISCOVERED SAVE YOURSELF”. Use the keyword “deceptive”
VIGENĔRE TABLEAU

Solution

Step 1
Write the plaintext as:
wearediscoveredsaveyourself
Since this message has a length of 27, it needs a key as long as 27 letters.
Step 2
Repeat the given keyword “deceptive” three times to obtain the following key:

deceptive deceptive deceptive


Step 3

Use this key and the Vigenĕre Tableau to encrypt the original plaintext into:
ZICVTWQNGRZGVTWAVZHCQYGLMGJ
QN4: The Vernam cipher uses English alphabet letters, whereby A to Z are given values from 01 to 26
respectively. Encrypt the phrase SECURITYISEVERYTHING using a key word TECHNOLOGY.

Answer:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Plaintext S E C U R I T Y I S E V E R Y T H I N G

Key T E C H N O L O G Y T E C H N O L O G Y

Plaintext 19 5 3 21 18 9 20 25 9 19 5 22 5 18 25 20 8 9 14 7

Key 20 5 3 8 14 15 12 15 7 25 20 5 3 8 14 15 12 15 7 25

TOTAL 39 10 6 29 32 24 32 40 16 44 25 27 8 26 39 35 20 24 21 32

Modulo 26 13 10 6 3 6 24 6 14 16 18 25 1 8 26 13 9 20 24 21 6

CIPHER M J F C F X F N P R Y A H Z M I T X U F

QN5: Using the XOR method, find the cipher of the following plaintext of bits
011100000110010110000000, whereby 10000101 used as a key.

Answer:

XOR logic table

Input Input Output


1 2
1 1 0
1 0 1
0 1 1
0 0 0
Plaintext 0 1 1 1 0 0 0 0 0 1 1 0 0 1 0 1 1 0 0 0 0 0 0 0

Key 1 0 0 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 0 1

Ciphertext 1 1 1 1 0 1 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 0 1

QN6: Given the ciphertext phrase [ ITFUCSNUANYHSTCTAATECARXIOONUX] from the


transposition cipher method, find the plaintext.

Solution

I T F U C S
N U A N Y H
S T C T A A
T E C A R X
I O O N U X

INSTITUTE OF ACOUNTANCY ARUSHA

QN7: Using playfair cipher method, encrypt the phrase “The Institute of Accountancy Arusha
Graduation” using the keyword “Friday”
Playfair table

F R I D A

Y B C E G

H K L M N

O P Q S T

U V W X Z

Plaintext: IN ST IT UT EO FA CX CO UN TA NC YA RU SH AG RA DU AT EX

Cipher-text: AL TO AQ ZO YS RF EW YQ ZH ZG LG GF FV OM GN IF FX GZ MD

QN8: Using the playfair cypher method encrypt the phrase “INFORMATION SECURITY” with the
keyword “MASTER”

Playfair Table

M A S T E
R B C D F
G H I/J K L
N O P Q U
V W X Y Z

IN FO RM AT IO NS EC UR IT YX
GP BU GR SE HP PM SF NF KS ZY

You might also like