Module Code & Module Title CC5004NI Security in Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Module Code & Module Title

CC5004NI Security in Computing

Assessment Weightage & Type


10% Weekly Assignment

Year and Semester


2022-23 Autumn

Student Name: Rojin Bimb


Group: L2N6
London Met ID: 22015860
College ID: NP01NT4S220059
Assignment Due Date: 14th December 2022
Assignment Submission Date: 14th December 2022

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Security in Computing CC5004NI

Question no 1
Describe the 4 rules which must be followed in order to encrypt a text using a Playfair
Cipher.
Answer:
The play fair cipher is based on the use of a 5X5 matrix of letters, which is constructed
by using a key. The set of rules to be followed in order to encrypt a text using a Playfair
cipher are:
1. Repeating letters of the plaintext which are in the same pair are separated with a
filler letter such as “X”.
2. Plain text letters in the same row are replaced by letters to the right.
3. Plain text letters in the same column are replaced by the letters below.
4. Else, each plaintext letter in a pair is replaced by the letter
5. that lies in its own row and column occupied by other plain text letter.

ROJIN BIMB 1
Security in Computing CC5004NI

Question no 2
Encrypt the Plaintext “SECURITY” using the key “COMPUTING”, by using the Playfair
Cipher.
Answer:
Plaintext: SECURITY
Key: COMPUTING
Now, constructing the 5X5 matrix:

C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z

Solution:
SE = QH
CU = OC
RI = LG
TY = GV

Hence, the cipher text is = QHOCLGGV

ROJIN BIMB 2
Security in Computing CC5004NI

Question no 3
Why are Transposition Ciphers considered to be weak?
Answer:
The cryptanalyst might easily rearrange the letters by performing simple frequency
counts on the ciphertext, which would show that letters appear in the cipher with exactly
the same frequency as they do in typical plaintext. This is the reason why transposition
ciphers are considered to be weak.

Question no 4
Encipher (encrypt) the message “SECURITY IN COMPUTING” using the Rail Fence
Cipher.
Answer:
In the rail fence cipher, a matrix is constructed based on the key and the length of
letters in the plain text. The key represents the number of rows and the length of the
plain text determines the row of the matrix. Since no key is provided here, the default
key 2 is used to construct the matrix. Then, the given plain text is filled diagonally in the
matrix.

S C R T I C M U I G
E U I Y N O P T N

Now, we write the characters line by line which gives the required cipher text.
Cipher text = SCRTICMUIGEUIYNOPTN

ROJIN BIMB 3
Security in Computing CC5004NI

Question no 5
Elaborate how Row Transposition Ciphers can be used to maintain the confidentiality of
an unencrypted message.
Answer:
Since the plain text has changed significantly, it is impossible to recover the original
message using conventional techniques. Thus, the unencrypted message is kept
secure and its confidentiality is maintained by row transposition ciphers in this manner.

Question no 6
What factor of the Product Cipher results in the resulting cipher text to become more
secure?
Answer:
Product ciphers are data encryption schemes that involve additional encryption of the
ciphertext created after encrypting a plaintext document. A more secure encryption may
be created by combining two or more straightforward substitution ciphers or
transposition ciphers. Hence, the hybrid analogy of product cipher from the substitution
cipher and transposition cipher results the cipher text to become more secure.

ROJIN BIMB 4

You might also like