0% found this document useful (0 votes)
31 views2 pages

Worksheet 5 Encryption Edited

Uploaded by

Thomas Webb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Worksheet 5 Encryption Edited

Uploaded by

Thomas Webb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Networks

Worksheet 5

Worksheet 5: Encryption
1. Explain the difference between HTTP and HTTPs.
HTTPs means it is secured by encryption.

2. Define the following terms.


Plain text: It is any readable data — including binary files — in a form that can be seen or
utilized without the need for a decryption key or decryption device. Plaintext would refer to any
message, document, file, and the like intended or having been encrypted.
Cipher text: Cipher text is encrypted text transformed from plain text using an encryption
algorithm. Cipher text can't be read until it has been converted into plaintext (decrypted) with a
key. The decryption cipher is an algorithm that transforms the ciphertext back into plaintext.
Encryption: Encryption is used to protect data from being stolen, changed, or compromised and
works by scrambling data into a secret code that can only be unlocked with a unique digital key.
Decryption: Decryption is the process of converting encrypted data back into its original form.
This is done by decrypting the ciphertext using the encryption key. Decryption is essential if you
want to access encrypted data without any issues

3. Explain what a brute force attack is.


A brute force attack is a hacking method that uses trial and error to crack passwords, login
credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorized access
to individual accounts and organizations' systems and networks.

4. Explain how frequency analysis can be used to help crack encryption.


The basic use of frequency analysis is to first count the frequency of ciphertext letters and then
associate guessed plaintext letters with them therefore cracking the code.

5. Using the Caesar shift cipher, where A=D, B=E etc., decode the encrypted message to find
where the package has been left.

XQGHU WKH VWDWXH


Plaintext message: Under the statue

6. Now encrypt a short message of your own using a shift cipher with a shift of between 1 and
25 characters. Give it to someone else to decode, while you decode their message. What
strategy did you use to decode the message?

Your encrypted message:Hvi Pidozy dn ocz wzno

Plaintext message: Man United is the best


Networks
Worksheet 5

Your partner’s encrypted message:

Plaintext message:

7. Agree with your partner a secret key word and use this to construct an encryption algorithm.
Send each other a coded message to decode.

Your plaintext message: The money is in the shoe

Your secret word: Segway

Your coded message: abcdefghijklmnopqrstuvwxyz

Your partner’s coded message: segwaybcdfhijklmnopqrtuvxz

Your partner’s plaintext message:

Extension task:
8. With your partner, make up an encryption algorithm of your own, encrypt a message and
swap encrypted messages to decode.

Explain your encryption method here:

You might also like