Module Code & Module Title CC5004NI Security in Computing
Module Code & Module Title CC5004NI Security in Computing
Module Code & Module Title CC5004NI Security in Computing
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Security in Computing CC5004NI
Question no 1
Describe the 4 rules which must be followed in order to encrypt a text using a Playfair
Cipher.
Answer:
The play fair cipher is based on the use of a 5X5 matrix of letters, which is constructed
by using a key. The set of rules to be followed in order to encrypt a text using a Playfair
cipher are:
1. Repeating letters of the plaintext which are in the same pair are separated with a
filler letter such as “X”.
2. Plain text letters in the same row are replaced by letters to the right.
3. Plain text letters in the same column are replaced by the letters below.
4. Else, each plaintext letter in a pair is replaced by the letter
5. that lies in its own row and column occupied by other plain text letter.
ROJIN BIMB 1
Security in Computing CC5004NI
Question no 2
Encrypt the Plaintext “SECURITY” using the key “COMPUTING”, by using the Playfair
Cipher.
Answer:
Plaintext: SECURITY
Key: COMPUTING
Now, constructing the 5X5 matrix:
C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z
Solution:
SE = QH
CU = OC
RI = LG
TY = GV
ROJIN BIMB 2
Security in Computing CC5004NI
Question no 3
Why are Transposition Ciphers considered to be weak?
Answer:
The cryptanalyst might easily rearrange the letters by performing simple frequency
counts on the ciphertext, which would show that letters appear in the cipher with exactly
the same frequency as they do in typical plaintext. This is the reason why transposition
ciphers are considered to be weak.
Question no 4
Encipher (encrypt) the message “SECURITY IN COMPUTING” using the Rail Fence
Cipher.
Answer:
In the rail fence cipher, a matrix is constructed based on the key and the length of
letters in the plain text. The key represents the number of rows and the length of the
plain text determines the row of the matrix. Since no key is provided here, the default
key 2 is used to construct the matrix. Then, the given plain text is filled diagonally in the
matrix.
S C R T I C M U I G
E U I Y N O P T N
Now, we write the characters line by line which gives the required cipher text.
Cipher text = SCRTICMUIGEUIYNOPTN
ROJIN BIMB 3
Security in Computing CC5004NI
Question no 5
Elaborate how Row Transposition Ciphers can be used to maintain the confidentiality of
an unencrypted message.
Answer:
Since the plain text has changed significantly, it is impossible to recover the original
message using conventional techniques. Thus, the unencrypted message is kept
secure and its confidentiality is maintained by row transposition ciphers in this manner.
Question no 6
What factor of the Product Cipher results in the resulting cipher text to become more
secure?
Answer:
Product ciphers are data encryption schemes that involve additional encryption of the
ciphertext created after encrypting a plaintext document. A more secure encryption may
be created by combining two or more straightforward substitution ciphers or
transposition ciphers. Hence, the hybrid analogy of product cipher from the substitution
cipher and transposition cipher results the cipher text to become more secure.
ROJIN BIMB 4