security

v:* {behavior:url(#default#VML);}
o:* {behavior:url(#default#VML);}
w:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

800×600

Normal
0
false

false
false
false

EN-US
X-NONE
X-NONE

MicrosoftInternetExplorer4

/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:”Times New Roman”,serif;}

 

Assignment #1

Security in Computing COSC2536/2537

 

Q1

(a) Decrypt the ciphertext

 

IAUTMOCSMNIMREBOTNELSTRHEREOAEVMWIH

TSEEATMAEOHWHSYCEELTTEOHMUOUFEHTRFT

 

This message was encrypted with a double transposition (of the type  discussed in the lecture and tute) using a matrix of 7 rows and 10 columns. Hint:  The first word is “there.”

(Marks 1.5)

 

(b) Find the plaintext and the key, given the cipher-text


CSYEVIXIVQMREXIH.

(Marks 1)

 

(c) Decrypt the following message that was encrypted using a simple substitution cipher:
GBSXUCGSZQGKGSQPKQKGLSKASPCGBGBKGUKGCEUKUZKGGBSQEICA
CGKGCEUERWKLKUPKQQGCIICUAEUVSHqKGCEUPCGBCGQOEVSHUNSU
GKUZCGQSNLSHEHIEEDCUOGEPKHZGBSNKCUGSUKUASERLSKASCUGB
SLKACRCACUZSSZEUSBEXHKRGSHWKLKUSQSKCHQTXKZHEUQBKZAEN
NSUASZFENFCUOCUEKBXGBSWKLKUSQSKNFKQQKZEHGEGBSXUCGSZQ
GKGSQKUZBCQAEIISKOXSZSICVSHSZGEGBSQSAHSGKHMERQGKGSKR
EHNKIHSLIMGEKHSASUGKNSHCAKUNSQQKOSPBCISGBCqHSLIMQGKG
SZGBKGCGQSSNSZXQSISQQGEAEUGCUXSGBSSJCqGCUOZCLIENKGCA
USOEGCKGCEUqCGAEUGKCUSZUEGBHSKGEHBCUGERPKHEHKHNSZKGGKAD

(Marks 2)

 

Q2 Using the letter encodings in Table I, the following two cipher-text messages were encrypted with the same one-time pad:

 

KHHLTK and KTHLLE

 

Find all possible plaintexts for each message and the corresponding one-time pad.

 

Table I Abbreviated Alphabet

(Marks 3)

 

 

Q3   Bob is a receiver and Alice is a sender. Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Alice has a message M=8596 to send.  Bob uses parameter p=89 and q=191, and chooses a small public key parameter e.  What are the values of suitable public and private keys?  How would Alice encrypt message M=8596? How would Bob decrypt the encrypted message C with the private key?

(Marks 2.5)

 

Q4 Alice has a message M=37 to send to Bob securely using ElGamal encryption algorithm. Bob chooses p=8081, g=2849, x=53. Alice chooses r=78. Show the encryption and decryption steps.

(Marks 2.5)

 

Q5 Alice has a message M=186 to send to Bob securely using Paillier encryption algorithm. Bob chooses p=11, q=17,and selects an integer g =188. Alice selects a random number r=97. Show the encryption and decryption steps.

(Marks 2.5)

 

 

The post security appeared first on Custom Essay Papers.

Previous answers to this question


This is a preview of an assignment submitted on our website by a student. If you need help with this question or any assignment help, click on the order button below and get started. We guarantee authentic, quality, 100% plagiarism free work or your money back.

order uk best essays Get The Answer