Security in Computing and IT in PDF
Added on 2022-08-24
13 Pages2776 Words33 Views
Running head: Security in Computing and IT
Security in Computing and IT
Name of the Student
Name of the University
Author Note
Security in Computing and IT
Name of the Student
Name of the University
Author Note
Security in Computing and IT 1
Table of Contents
Task 1:........................................................................................................................................2
Task 2:........................................................................................................................................3
Task 3:........................................................................................................................................6
Task 4:........................................................................................................................................9
References:...............................................................................................................................11
Table of Contents
Task 1:........................................................................................................................................2
Task 2:........................................................................................................................................3
Task 3:........................................................................................................................................6
Task 4:........................................................................................................................................9
References:...............................................................................................................................11
Security in Computing and IT 2
Task 1:
a)
Caesar cipher: For passing an encrypted message from one to pther person, this is the first
needed thing for both of the parties that they need to be having a key for the cipher for
encrypting the message as well as the receiver can decrypt the message. For the Caesar
cipher, the key is basically a number of characters for shifting the cipher alphabet.
Example.
Plain text: This is a secret message.
The shift: 3
Cipher text: Wklv lv d vhfuhw phvvdjh.
Transportation cipher: The decryption with the help of columnar transportation is very
much similar to the encryption. It follows a simple rule to mix up the characters the
characters of the plain text for forming the cipher text.
Example:
Let, there is a key: GERMAN
Plain text: defend the east wall of the castle
It can be written that:
G E R M A N
d e f e n d
t h e e a s
t w a l l o
f t h e c a
s t l e x x
Task 1:
a)
Caesar cipher: For passing an encrypted message from one to pther person, this is the first
needed thing for both of the parties that they need to be having a key for the cipher for
encrypting the message as well as the receiver can decrypt the message. For the Caesar
cipher, the key is basically a number of characters for shifting the cipher alphabet.
Example.
Plain text: This is a secret message.
The shift: 3
Cipher text: Wklv lv d vhfuhw phvvdjh.
Transportation cipher: The decryption with the help of columnar transportation is very
much similar to the encryption. It follows a simple rule to mix up the characters the
characters of the plain text for forming the cipher text.
Example:
Let, there is a key: GERMAN
Plain text: defend the east wall of the castle
It can be written that:
G E R M A N
d e f e n d
t h e e a s
t w a l l o
f t h e c a
s t l e x x
Security in Computing and IT 3
Encryption: For encryption the columns need to be reordered alphabetically. Such that:
A E G M N R
n e d e d f
a h t e s e
l w t l o a
c t f e a h
x t s e x l
Cipher text is: nalcx ehwtt dttfs eelee dsoax feahl.
b)
For several scenarios the decryption time can more than 48 hours such as for AES decryption.
However for high end systems the time can be less such as for columner transposition the
time for decryption can be less than 60 seconds.
c)
For making the decryption process harder the user can use two combined cryptographic
methods. As that will be kind of two locks in a door but with different protocols. By
implementing two different algorithm combinely the encryption will be more strong and it
will make the decryption process harder.
d)
By understanding about the algorithms and decryption techniques properly, the process of
decryption will be faster. The most important thing for decryption is the key. If, the user will
be unaware about the keys, then there will be difficulties in decryption. However, after
known proper keys and technique the user will be able to decrypt the cipher text successfully.
Task 2:
The student ID is: 3833235
Encryption: For encryption the columns need to be reordered alphabetically. Such that:
A E G M N R
n e d e d f
a h t e s e
l w t l o a
c t f e a h
x t s e x l
Cipher text is: nalcx ehwtt dttfs eelee dsoax feahl.
b)
For several scenarios the decryption time can more than 48 hours such as for AES decryption.
However for high end systems the time can be less such as for columner transposition the
time for decryption can be less than 60 seconds.
c)
For making the decryption process harder the user can use two combined cryptographic
methods. As that will be kind of two locks in a door but with different protocols. By
implementing two different algorithm combinely the encryption will be more strong and it
will make the decryption process harder.
d)
By understanding about the algorithms and decryption techniques properly, the process of
decryption will be faster. The most important thing for decryption is the key. If, the user will
be unaware about the keys, then there will be difficulties in decryption. However, after
known proper keys and technique the user will be able to decrypt the cipher text successfully.
Task 2:
The student ID is: 3833235
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Security in computing and information technologylg...
|9
|1672
|462
Cryptography Tutorial with Examples and Exercises - Deskliblg...
|20
|3498
|416
Cryptography and its Typeslg...
|32
|4897
|30
IFN648 | Applied Cryptographylg...
|16
|2694
|27
Foundation of Cyber Securitylg...
|23
|5334
|304
Applied Cryptography Assignment 2022lg...
|17
|2555
|21