Reference no: EM133909301
Assessment:
Introduction
You will submit work in tutorial activities during the study period. This is an individual assessment.
Part A Classical Encryption
Task:
You are given the following encrypted message:
gsrh rh z hvxvgrlm
1. Visit the website: Boxentriq Cipher Identifier
2. Paste the encrypted message into the tool and identify the cipher used.
3. Use the linked decryption tool provided by Boxentriq to automatically decrypt the message.
4. Explain the difference between:
Stream Ciphers vs. Block Ciphers
Substitution Ciphers
5. Classify the identified cipher (e.g., Atbash) and explain whether it is a stream, block, or substitution cipher.
6. Discuss the strengths and weaknesses of the cipher in terms of cryptographic security. Get Assignment Help from Trusted tutors.
7. Include screenshots of:
Cipher identification result
Decryption tool interface
Final decrypted message
Task:
You are required to encode and decode your student number using the Vigenère Cipher.
1. Visit the website: Vigenère Cipher Tool - Boxentriq
2. Use a keyword of your choice (e.g., your first name or "SECURE") to:
Encrypt your student number (e.g., 12345678) by converting it into a text format (e.g., onetwothreefourfivesixseveneight)
Decrypt the resulting ciphertext using the same keyword
3. Take screenshots of:
The encryption process
The ciphertext
The decryption result
4. Explain:
How the Vigenère Cipher works
Why it is considered a polyalphabetic substitution cipher
Its strengths and weaknesses in modern cryptography
One way to solve the key distribution problem is to use a line from a book that both the sender and the receiver possess. Typically, at least in spy novels, the first sentence of a book serves as the key. The particular scheme discussed in this problem is from one of the best suspense novels involving secret codes, Talking to Strange Men, by Ruth Rendell. Work this problem without consulting that book!
Consider the following message:
koeywduz dk omewzbuof ucftz gcw ojozwcmo
This ciphertext was produced using the first sentence of a different book:
The fog rolled in from the sea and the lanterns flickered in the cold breeze.
Tip:
A → T
B → h
C → e
D → f
E → o
F → g
G → r
H → l I → d
J → i
K → n
L → s
M →a
N →m
O → c
P → b
Q → v
R →w
S → k
T → u
U → y V → j W →x
10
X → q
Y → z
Z → p
Decode the message: koeywduz dk omewzbuof ucftz gcw ojozwcmo
Hint: The original plaintext is a meaningful sentence related to cybersecurity.
Part B Encryption Calculations
Show all steps in solving RSA when p = 7 and q = 19, e = 5. M (message) = 5.
Research and explain how prime numbers are calculated and the algorithms used to calculate RSA. Explain the steps in the Man-in-the-Middle Attack.
AES
Given the plaintext {101112131415161718191A1B1C1D1E1F} and the key {02020202020202020202020202020202}:
Show the original contents of State, displayed as a 4 × 4 matrix.
Show the value of State after initial AddRoundKey
Show the value of State after SubBytes - use Table provided below.
Show the value of State after ShiftRows
Show the value of State after MixColumns
Classical Encryption
Task:
1. Use the Caesar Cipher tool to encode and decode a message with a shift of your choice.
2. Generate a key pair using Gpg4win and encrypt a short message. Get Assignment Help from Trusted tutors.
3. Use Wireshark for Windows to capture the encrypted message and analyze the packet data.
4. Discuss the strengths and weaknesses of Caesar Cipher and Gpg4win in modern cryptographic contexts.
Resources:
Caesar Cipher Tool - dCode
Gpg4win Download
Wireshark for Windows
Caesar Cipher Explanation - GeeksforGeeks