Find the plaintext by frequency analysis technique as

Assignment Help Other Subject
Reference no: EM132282094

Q1 Cryptanalysis

(a) [Cryptanalysis on Simple Substituion Cipher]

Show step-by-step process to find the plaintext and the key for the following ciphertext using the concept of simple substitution cipher as discussed in Lecture-1:
BUJKIXQLUVKD

(b) [Cryptanalysis on Double Transposition Cipher]

Decrypt the following ciphertextusing the double transpositioncipher (as discussed in the Lecture-1 and Tute-1) using a matrix of 9 rows and 8 columns.
TAWETNSHENGAMINEQTNSUIOEFHYTUENLIUVOFHAYETCNSENEETSFRHIOOVOAUEGHENHUFDTO

(c) [Cryptanalysis on Substituion Cipher]
Assume that the following ciphertext has been produced using a substitution cipher. Please note that it may not be a simple ‘shift by n'substitution. The ciphertext is as follows:

AOEDQFTREDAENUFTREJSHGCTAJXGUTOC QD AOEAGUYDSJGFUAQJYJSQYSJGFUAQJYAJTGEVEYAJAOEGDSGJFJLDEGVQYXQADFEUYQYX. OEGE, BE TGEVEYAQYSJGFUAQJYSGJFGEUHOQYXUYEYEFCQY U KDULRESJGF. HJYSQMEYAQURQAC QD VQEBEMUDAOEHEYAGURQDDKEQYAOESQERMJSQYSJGFUAQJYTGJAEHAQJY.DEHKGEHJFFKYQHUAQJY QD AOEDAGUQXOASJGBUGMKDEJSHGCTAJXGUTOC.AOEIECFUYUXEFEYATGJLREFOUDTGEVEYAEMDEHKGEHJFFKYQHUAQJYSGJFLEHJFQYXHJFFJYTRUHE.AOEMEVERJTFEYAJSTKLRQH-IECHGCTAJXGUTOCHGEUAED U RUGXE-DHUREYEABJGIJSTEJTRE BOJ HUYHJFFKYQHUAEDEHKGERCBQAOJYEUYJAOEGEVEY QS AOECOUMYEVEGHJFFKYQHUAEMLESJGE.

Find the plaintext by frequency analysis technique as discussed in Lecture-1 and tutorial-1.

Q2 [Application of Hash Algorithm]

Assume that Alice, Bob and Trudy want to participate in an online auction to purchase an item. The idea here is that these are supposed to be sealed bids, i.e.each bidder gets one chance to submit a secret bid. In order to submit a secret bid, a bidder generates hashvalue of their bid amount using SHA-256 hash algorithm, and sends the hash value as their bid to the auctioneer. All of the bids are revealed when all of the participants send their secret bid to the auctioneer. Trudy is a smart person who is certain that Alice and Bob will both place their bids between $201 and $211. Trudy captures the following hash values of Alice and bob:
Hash value of Alice:

968076BE2E38CF897D4D6CEA3FACA9C037E1A4E3B4B7744FB2533E07751BD30A

Hash value of Bob:
FC56DBC6D4652B315B86B71C8D688C1CCDEA9C5F1FD07763D2659FDE2E2FC49A

i. Describe a forward search attackstep-by-stepby which Trudy can determine Alice's and Bob's bid from their respective hash values.

ii. Describe how the above bidding procedure cane be modified to prevent a forward search attack.

Q3 [RSA Encryption algorithm]

Say, Alice and Bob are two officers in the federal security services. Alice wants to send a secret message to Bob by encrypting the secret message. In other words, Alice is the sender and Bob is the receiver. However, Alice and Bob have no shared secret key. Therefore, they have to use Public-Key cryptography. Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Alice encrypts her secret message using RSA encryption and sends the encrypted message to Bob. Consider that Alice has a secret message M=9876 to send to Bob. Bob uses parameter p=1931 and q=947, and chooses a small public key parameter e. What are the values of suitable public and private keys? How would Alice encrypt message M=9876? How would Bob decrypt the encrypted message C with the private key?You need to show every step. [Hints: Use the concept that is discussed in Lecture-3 and Tutorial-3].

Q4 [Breaking RSA Encryption algorithm]
Recently, researchers have successfully decrypted the RSAciphertext without knowing the private key. In this question, we would like to examine your understanding on one of the RSA cryptanalysis techniques, called prime factorization. Assume that Alice wants to send a message to Bob. Bob generates public and private keys using RSA Encryption algorithm and publishes the public key (n=4717, e=19). Alice has a secret message M to send. Nobody knows the value of M. She encrypts the message Musing the public key and sends the encrypted message C=1466to Bob. Trudy is an intruder who knows RSA and prime factorization well. She captures the encrypted message C=1466. She also has the public key (n=4717, e=19) because it is known to all. How can she decrypt the encrypted message C and find the value of M? Show all the steps.[Hints: Use the concept that is discussed in Lecture-3].

Q5 [ElGamalEncryption algorithm]
Alice has a message M=51to send to Bob securely using ElGamal encryption algorithm. Bob chooses p=8167, g=4063, x=71. Alice chooses r=29. Show the encryption and decryption steps.[Hints: Use the concept that is discussed in Lecture-4 and Tutorial-4].

Q6 [PaillierEncryption algorithm]
Alice has a message M=3456to send to Bob securely using Paillier encryption algorithm. Bob chooses p=137, q=101,and selects an integerg=173. Alice selects a random number r=73. Show the encryption and decryption steps. [Hints: Use the concept that is discussed in Lecture-4 and Tutorial-4].

Attachment:- SECURITY IN COMPUTING.rar

Verified Expert

This assignment was based on the computer security and cryptographic techniques. There were total 6 questions. First question was divided into three more sub-questions in which the solution has been provided according to the simple substitution cipher, double transposition cipher and substitution cipher methods respectively. The second question was on application of hash algorithm and solved accordingly. Next two questions was related with the encryption and decryption using RSA algorithm and has solved respectively.The fifth question was based on EIGamal algorithm for encryption and solved according to the method. The last question was related to Paillier encryption algorithm and has been solved as per the needs.

Reference no: EM132282094

Questions Cloud

Current manual inspection system : Suppose annual demand is 5,500 units. Should the firm lease the new inspection system?
What would be some good activities for the estimator : What role does the estimator have AFTER the project has started? What would be some good activities for the estimator to do with the project team to improve.
What can social agencies do to help combat inequality : What do you think individuals can do to help combat inequality in education? What can social agencies do to help combat inequality in education?
Sample mean outer diameter : A machine operator takes several sample measurements over time and determines the sample mean outer diameter to be 1.002 inches with a standard deviation of 0.0
Find the plaintext by frequency analysis technique as : COSC2536 - Security in Computing and Information Technology - RMIT University - Find the plaintext by frequency analysis technique
What information is being collected about you : What information is being collected about you? After answering these question please describe your reactions. Were there any surprises that you didn't expect?
What is the average time in minutes a customer : A CSR can serve customers in 8 minutes on the average. Customers call the help line at an average rate of 6.5 per hour. Assume there is only one CSR at the call
How would you go about mitigating the risk : In the media you may have had exposure to the latest Intel vulnerabilities with Spectre and Meltdown. Imagine that you are the IT director at a large company.
Briefly explain how the hiv-aids epidemic has changed : Briefly explain how the HIV/AIDS epidemic has changed since it first emerged in 1981. Explain how the roles of medical social workers have evolved.

Reviews

len2282094

4/13/2019 2:48:00 AM

Hi I am attaching two files, one of them is the requirement and other two are the tutorials which would be helpful for you yo solve it. kindly use less possible you don't need to describe it. I need it to be done by sunday so please let me know

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd