You are on page 1of 2

HOMEWORK -1 CSE403T: Network Security & Cryptography Allocation week -5 Each question carries 5 marks Autumn Term 2012

Submission Week-6 MM 20

Q1(a) Differentiate between an unconditionally secure cipher & computationally secure cipher? (b) Show a Playfair cipher in use using a 4X6 matrix, ignoring Q & Z and filling other 24 alphabets of English language, keyword is your McDonalds and plaintext is I am loving it. (c) Take a plaintext - The diamond was last seen in cottage house, use- Keyword My name is _________, use this keyword to Encrypt the plain text, the Algorithm to be used in one-time pad. [Remember to do a XOR] (d) My Birth Place is __________, _____________ ( put city and state), then use the double transposition technique to encrypt the information. (e) Which cipher uses continuous repetition of one word key, and how long the keyword is repeated? Explain it with keyword <your parents name> Q2) For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. a. An organization managing public information on its Web server. b. A law enforcement organization managing extremely sensitive investigative information. c. A financial organization managing routine administrative information (not privacy related information). d. An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole. e. A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.

Q3) The following ciphertext was generated using a simple substitution algorithm.

Decrypt this message. Hints: 1. As you know, the most frequently occurring letter in English is e. Therefore, the first or second (or perhaps third?) most common character in the message is likely to stand for e. Also, e is often seen in pairs (e.g., meet, fleet, speed, seen, been, agree, etc.).Try to find a character in the ciphertext that decodes to e. 2. The most common word in English is the. Use this fact to guess the characters that stand for t and h. 3. Decipher the rest of the message by deducing additional words. Warning: The resulting message is in English but may not make much sense on a first

Q4)

You might also like