Sei sulla pagina 1di 6

COMPUTER SECURITY

23/10/2017 (Monday 10-1pm)


CRYPTO LAB: Crypto Games Classical Cipher

GROUP NAME:
METRICNO:

Lets start the work and have fun with it!

Refer to: i. http://www.simonsingh.net/The_Black_Chamber/chamberguide.html


ii http://www.cryptool-online.org/
iii. Additional notes on E-learning

The lab work consists of two basic processes that involve in cryptography. The processes are
as follows:

Encryption process

a. Select encryption algorithm


b. Generate or choose encryption key
c. Encrypt the plaintext
d. Get the encryption result

Decryption process

a. Select decryption algorithm


b. Generate or choose decryption key
c. Decrypt ciphertext
d. Get the decryption result
A. Cryptography Experiment

Substitution:

i. Encrypt the plaintext using CrypTool with different methods:

Substitution with Caesar Cipher using key: 3, 4, 60, Z

Plaintext Ciphertext Ciphertext Ciphertext


Key: 3 Key: 4 Key: 60
Your password is CSYV GWCZ
sec*cs03 BRXU TEWWASVH XIAAEWZL QA
SDVVZRUG LV MW WIG*GW03 AMK*KA03
VHF*FV03

XYZABC BCDEFG FGHIJK


ABCDEF

aaaaaaXXXX EEEEEEBBBB IIIIIIFFFF


DDDDDDAAAA

We go to the zoo every AI KS XS XLI EM OW BW


year ZH JR WR WKH DSS IZIVC CIEV BPM HWW
CRR HYHUB MDMZG GMIZ
BHDU

ii. Write down the encryption algorithm (Caesar Cipher), if key is 60.

C=(K+P) mod 26

C=(60+P) mod 26

Eg: P=Y
= (60 + 24)mod 26
= 84 mod 26
= 6 = G

iii. Using brute-force attack, break the ciphertext (Caesar Cipher) given:

DZRX SN AQDZJ

The plaintext is EASY TO BREAK

How did you do it? By shift key = 1


Substitution with keyword: SMILE

Plaintext Ciphertext Ciphertext Ciphertext


Key: 3 Key: 4 Key: 60
Your password is
sec*cs03

XYZABC

aaaaaaXXXX

We go to the zoo every


year

Vigenere cipher: (please refer to the Vigenere Tableau


http://nob.cs.ucdavis.edu/classes/ecs155-2005-04/handouts/vigenere.html)

i. Key: SMILE

Plaintext Ciphertext

aaaaaaXXXX SMILESJFIB

Your password is QACC TSEAHSJP QD WWO*KD01


sec*cs01

We go to the zoo every OQ OZ XG FPP DGA MGIJK GPEJ


year
B. Result Analysis

i. Identify the pattern of encryption results (ciphertext), identify the advantages and
disadvantages of each cipher systems.

System Advantages Disadvantages


Caesar cipher

One of the Simple structure


easiest methods usage
to use in Can only provide
cryptography and minimum security
can provide to the information
minimum security Frequency of the
to the information letter pattern
Use of only a provides a big
short key in the clue in
entire process deciphering the
One of the best entire message
methods to use if
the system
cannot use any
complicated
coding
techniques
Requires few
computing
resources

Substitution with
keyword

Vigenere cipher

ii. Analyse the ciphertext for:


a. Number, Symbol, Repeated alphabet (i.e. zoo)

System Number Symbol Repeated


alphabet
Caeser Cipher

Substitution with
keyword

Vigenere

b. Use the frequency analysis to analyse the alphabet distribution

Playfair key: SMILE

(Refer to http://www.simonsingh.net/The_Black_Chamber/playfaircipher.html

Plaintext: PERSONAL COMPUTER MUST BE SECURED

Ciphertext: US PI GO DS FK SQ PU IU EQ LP FM MS FR UI FL

Transposition (Row and Column)

Plaintext: PERSONAL COMPUTER MUST BE SECURED


i. Column Transposition using key : 1 4 2 5 3

Draw the matrix.

Ciphertext:_______________________________________________

ii. Row Transposition using key : 1 4 2 5 3


Draw the matrix.

Ciphertext:_______________________________________________

Potrebbero piacerti anche