You are on page 1of 3

FN612 NETWORK SECURITY

LAB 3

LAB 3
ENCRYPTION AND AUTHENTICATION TO PROTECT DATA
Learning Outcomes:

Determine how encryption can protect data

Differentiate two classes of key based encryption

Theory / Preparation:
Authentication and encryption are important areas in computer security. The purpose of these
two is ultimate in providing protection against data. Various attacks are launched towards
systems which do not have proper authentication. To be able to differentiate types of
encryption/authentication for implementation, students need to have a good understanding of
the characteristics, and how it works.
Lab Activity:
1. Identify various authentication application technologies.
2. Discuss the attacks launched if authentication is not implemented.
3. In group of three, discuss the terminologies in cryptography.
4. Differentiate symmetric and asymmetric algorithms.
Lab Exercise:
Exercise A : Caesar Cipher Substitution Cipher
1. To use a substitution cipher we replace (substitute) each letter of the plain text with a different
letter in the cipher text.
2.
3. To use this cipher we need a table of letter replacements.
Plain

C D E H I

P R S T Y

Cipher X J L A Z E V K

H O M

Using this substitution, the plaintext PRICE is changed to this ciphertext


VKZXL
a. Encrypt the message THIS SENTENCE IS ENCRYPTED
b. Encrypt the message IN THE SPEED
Page 1 of 3

FN612 NETWORK SECURITY

LAB 3

c. Decrypt the message HLXKLO

Exercise B : Playfair Cipher


Choose your own key for the Playfair Cipher and use it to encrypt a message
1.

Let say key word is OCEAN

2.

Here are the steps to follow:


i.

Design a 5x5 matrix

ii.

Put the OCEAN in the matrix

iii.

Complete the remaining alphabet characters, by replacing J=I. So total we


have 25 characters ( exclude J)

iv.

Put the plain text in pairs

v.

Follow the rules of Playfair Cipher


O
B
I
Q
V

C
D
K
R
W

E
F
L
S
X

A
G
M
T
Y

N
H
P
U
Z

Example to encrypt a message :


Plaintext : LECTURER
Cipher text : SFARQSCS (listen to the lecturers explanation on how to encrypt the message
and rules for Playfair cipher)
a.

Encrypt the message BEAUTIFUL using the same keyword as above

b.

Encrypt the message POLITEKNIK using the same keyword as above

c.

Decrypt the cipher QCQUCS to get the plaintext

Reflective Questions :
1.

What are the differences between authentication and encryption?


(2m)

2.

List down two examples of symmetric and asymmetric algorithms.


(2m)

Page 2 of 3

FN612 NETWORK SECURITY

3.

LAB 3

How encryption is used to protect data? Give one example application that uses
encryption.
(3m)

4.

You are asked to use the Playfair cipher to encrypt and decrypt messages. The
keyword given is EMAIL. Encrypt the following :
a. Flowers
b. Success
c. Happiness
(3m)

Page 3 of 3

You might also like