Information Security Assignment Questions
Information Security Assignment Questions
1. A sends a message to B in the encrypted format. What type of attack is possible in this
scenario?
2. Using this Playfair matrix
M F
U N
Z V
E L
D S
encrypt this message: mustseeyou
H
O
W
A
T
I/J
P
X
R
B
K
Q
Y
G
C
3. Encrypt the message "meet me" using the Hill cipher with the key (
).
4. Using the Vigenre cipher, encrypt the word "explanation" using the key leg.
5. This problem explores the use of a one-time pad version of the Vigenre cipher. In this
scheme, the key is a stream of random numbers between 0 and 26. For example, if the
key is 3 19 5 ..., then the first letter of plaintext is encrypted with a shift of 3 letters, the
second with a shift of 19 letters, the third with a shift of 5 letters, and so on. Encrypt the
plaintext sendmoremoney with the key stream 9 0 1 7 23 15 21 14 11 11 2 8 9.
6. Using Rail fence technique, encrypt the plain text postponeattacktilllnotice using 3
rows.
ANSWER KEYS
1. Traffic Analysis
2. Plain Text : MUST SEE YOU
Cipher Text : UZ TB LD GZ PN
3. Plain Text : MEET ME
Enciphering Matrix : (
)(
)(
) (
(
(
)
)
) (
(
(
) (
)
)
GVUIGV
4. PBVWETLXOZR
5. BEOKJDMSXZPMH
6. PTNTCINI OPETKLOC SOAATLTE
7.
DES
AES
Stream cipher
Block cipher
No: of rounds = 16
No: of S-boxes = 8
No: of S-boxes = 1
Look
up
tables
used
are:
choice
2,
inverse
initial
operations
substitution,
used
shifting
are:
rows,
bytemixing
8. Cipher Text : YITJP GWJOW FAQTQ XCSMA ETSQU SQAPU SQGKC PQTYJ
Plain Text : DIFFICULTIES ARE THINGS THAT SHOW WHAT MEN ARE P
9. n = p*q
n= 3*11=33
f(n) = (p-1)*(q-1) = 2*10 = 20
e=7
7*d = 1 (mod 20) => d = 3
PU = {7,33}
PR = {3,33}
M=5
Calculating x:
5 = 15 10(1)
5 = 15 [25 15(1)](1)
5 = 15(2) 25(1)
5 = [40 25(1)](2) 25(1)
5 = 40(2) 25(3)
5 = 40(2) [65 40(1)](3)
5 = 40(5) 65(3)
X=5