You are on page 1of 15

Cryptography.

doc

CSCI 1321

You must do at least 90% of this homework without the assistance of anyone else. Once you have 90% or
more of the homework completed, you may double check your answers with a team-mate or study-partner.
I have completed at least 90% this homework assignment on my own. I/We realize that it is a violation of
academic integrity to share this work with others, either this semester, or after the class is over.
I/We realize that the penalty for turning in work that is not my own, or assisting others in doing so, can range
from an "F" in the class to dismissal from Trinity University
Print Name _________________________________________

Time Required = ______.____ Hrs.

Signature _______________________________________________________________
Team-Mate Name __________________________________________________________

Cryptography
Homework
15 Points

1. _______ In the public-key method of cryptography, which key is publicly known?


A)
Encryption key only
B)
Decryption key only
C)
Both
D)
None of the above
2. _______ . A cipher is _?_
A)
An encryption algorithm
B)
A decryption algorithm
C)
A private key
D)
(a) or (b)
3. _______ Before a message is encrypted, it is called _?_.
A)
Ciphertext
B)
Ciphertext
C)
Cryptonite
D)
Plaintext
5. _______ The _?_ is an example of polyalphabetic substitution.

Cryptography.doc
A)
B)
C)
D)

CSCI 1321

P-box
Vigenere cipher
S-box
Product block

6. _______ In the symmetric-key method of cryptography, which key is publicly known?


A)
Encryption key only
B)
Decryption key only
C)
Both
D)
None of the above
E)
All of the above
7. _______ We use a cryptography method in which the character Z always substitutes for the character G.
This is probably _?_.
A)
Polyalphabetic substitution
B)
Transpositional
C)
Monoalphabetic substitution
D)
None of the above
E)
All of the above
8. _______ The RSA algorithm uses a _?_cryptography method.
A)
Private-key
B)
Symmetric-key
C)
Denominational
D)
Public-key
9. _______ The _?_ is a block cipher.
A)
P-box
B)
S-box
C)
Product block
D)
All the above
E)
None of the above
10. _______ We use an cryptography method in which the plaintext AAAAAA becomes the ciphertext
BCDEFG. This is probably _?_.
A)
Monoalphabetic substitution
B)
Transposition
C)
Polyalphabetic substitution
D)
None of the above
E)
All of the above
11. _______ In the public-key method of cryptography, only the receiver has possession of the _?_.
A)
Public key
B)
Both keys
C)
Private key
D)
None of the above
12. _______ After a message is decrypted, it is called _?_.
A)
Ciphertext
B)
Ciphertext
C)
Cryptonite
D)
Plaintext

13. _______ After a message is encrypted, it is called _?_.


A)
Ciphertext

Cryptography.doc
B)
C)
D)

CSCI 1321

Ciphertext
Cryptonite
Plaintext

14. S______________________________ W_________________________ Cryptography meant _?_ in


Greek
15. ______________________________ _?_ is the art and science of transforming messages to make
them secure and immune to attacks
16. ______________________________ _?_ _?_ renders a message unintelligible to unauthorized
personnel.
17. ______________________________ _?_ transforms an intentionally unintelligible message into
meaningful information.
18. ______________________ ______________________ In cryptography, the encryption/decryption
algorithms are _?_ {public/secret}; the keys are _?_ {public/secret}.
19. _______ {T/F} Every sender/receiver pair needs its own cipher for secure communication.
20. ______________________ One cipher can serve millions of communicating pairs through the use of _?
_ {public/secret} keys and _?_ {public/secret} ciphers.
21. ______________________-key ______________________-key All cryptography algorithms can be
divided into two groups: _?_ (also called secret key) and _?_ (also called public key)
22. ______________________-key ______________________-key All cryptography algorithms can be
divided into two groups: _?_ (also called asymmetric key) and _?_ (also called symmetric key)
23. ______________________-key

Asymmetric key) ciphers are also called _?__-key

24. ______________________-key

Symmetric key) ciphers are also called _?__-key

25. The three upper layers of the OSI Model are the A_?_ layer, the P _?_ layer, and the S_?_ layer,
A______________________ P_____________________ S_____________________
26. ____________________________ The upper layers of the OSI Model are implemented with _?_
{Software/Hardware}.
27. ____________________________ In the OSI Model, the _?_ layer establishes, maintains, &
synchronizes between communicating upper layers.
28. ____________________________ In the OSI Model, the _?_ layer would handle with problems such as
inadequate disk space and no paper in printer; these functions would often be included in the operating
system software.
29. ____________________________ The services of the _?_ layer, in the OSI model, would include
coordinating connection & disconnection of dialogs between applications, providing synchronization points
for data exchange, coordinating who sends & when, and ensuring that the data exchange is complete before
the session gracefully closes.

30. Which of the four components of the Presentation Layer would concern itself with making sure that the
ASCII user deals with ASCII info and the EBCDIC user deals with EBCDIC info.

Cryptography.doc

CSCI 1321

A) Translation
B) Encryption/Decryption
C) Authentication
D) Compression
client.
33. ______________________________ In cryptography, the sender uses an _?_ key to transform
plaintext into encrypted ciphertext.
34. ______________________________ In cryptography, the receiver uses a _?_ key to transform
ciphertext back into the original plaintext
35. S ______________________________ T______________________________ The two earliest and
simplest classifications of symmetric-key cipher algorithms are _?_ and _?_.
36. M _____________________ P_____________________ T_____________________ The
symmetric-key substitution algorithm simply substitutes one symbol with another using character-level
encoding. Three of the major substitution algorithms classifications of these are M_?_ or P_?_ or T_?_.
37. _____ In the _?_ ciphers, a character in the plaintext is always changed to the same character in the
ciphertext, regardless of its position in the text. For example, an A is always changed to a D.
A) Monoalphabetic,
B) Polyalphabetic
C Transpositional
D) Bit-Level

38. ________________________________________________________ Using the monoalphabetic


cipher key above, encrypt the plaintext message ATTACK NOW with a key = 3. List the ciphertext.

39. ________________________________________________________ Using the monoalphabetic


cipher key above, decrypt the ciphertext message BRX DUH ULJKW with a key = 3. List the plaintext.

Cryptography.doc

CSCI 1321

40. ________________________________________________________ Using the more advanced


monoalphabetic cipher key above, encrypt the plaintext message ATTACK NOW. List the ciphertext.

41. ________________________________________________________ Using the more advanced


monoalphabetic cipher key above, decrypt the ciphertext message HR MRJ DI. List the ciphertext.
42. ________ In monoalphabetic substitution, the relationship between a character in the plaintext and a
character in the ciphertext is _?_.
A) one-to-one
B) one-to-many
C) many-to-one
D) one-to-many
43. _____________________ In the _?_ cipher each character is replaced with a potentially different
character in the character set. The replacements for the letter D need not all be the same!
A) Monoalphabetic,
B) Polyalphabetic
C Transpositional

44. ____________________________________________________________ Using the Vigenere cipher


grid above, encrypt the plaintext Computer Science Rocks using the key BABBAGEWASBRILLIANT.
Write the ciphertext message.
45. ____________________________________________________________ Using the Vigenere cipher
grid above, decrypt the ciphertext MM PW XEITX MV OEBA TFHBX ERXPSKRMET using the key
ETHERNET. Write the plaintext message.
46. _______ {T/F} There are many collections of letters, and or digits, that can be used for the Vigenere
square/grid.

Cryptography.doc

CSCI 1321

47. ________ In polyalphabetic substitution, the relationship between a character in the plaintext and a
character in the ciphertext is _?_.
A) one-to-one
B) one-to-many
C) many-to-one
D) one-to-many

Plaintext

Ciphertext

48. Using the eleven character transpositional cipher key above, encrypt the ciphertext message
CRYPTOGRAPHY IS THE ART AND SCIENCE OF TRANSFORMING MESSAGES TO MAKE THEM
SECURE AND IMMUNE TO ATTACKS. Place the continuous flow plaintext on the left and transform it to
appropriate ciphertext on the right.

Ciphertext

Plaintext

49. Using the eleven character transpositional cipher key above, decrypt the ciphertext message

Cryptography.doc

CSCI 1321

OGYRTCPARPHORAIGYHT LM PAUESLB_RI TAHDC_ENKRES_AERPY_I__T__V__AE .


Place the continuous flow ciphertext on the left and transform it to appropriate plaintext on the right.

50. _______ {T/F} In symmetric-key cryptography, the same key is used by the sender (for encryption) and
the receiver (for decryption).
51. _______________________________________________________________________________ One
of the major advantages of symmetric-key cryptography is efficiency. Why are these small keys more
efficient?
52. ________________________________ One of the major disadvantages of symmetric-key
cryptography is that each pair must have a unique symmetric key. If N people want to use this method, there
needs to be _?_ symmetric keys. List the formula.
53. _____________________ In the _?_ cipher all data [text, graphics, audio, & video] is divided into
blocks of bits and substituted in accordance with some key.
A) Monoalphabetic,
B) Polyalphabetic
C) Transpositional
D) Bit-Level

54.

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

Use the bit-level encoder above, and the ASCII table at the beginning of this assignment sheet, to encrypt
the plaintext = NETWORK
55. _______ {T/F} In symmetric-key cryptography, different keys is used by the sender (for encryption) and
the receiver (for decryption).

56. S______________________________

Cryptography.doc

00100010
00100010
00100001
00100010
00100001
00100001

00011000
00101000
01000010
00100001
00011000
01000001

=
=
=
=
=
=

___
___
___
___
___
___

___
___
___
___
___
___

___
___
___
___
___
___

___
___
___
___
___
___

___
___
___
___
___
___

CSCI 1321

___
___
___
___
___
___

___
___
___
___
___
___

___
___
___
___
___
___

= _S_
= ___
= ___
= ___
= ___
= ___

Use the bit-level decoder above, and the ASCII table at the beginning of this assignment sheet, to decrypt
the ciphertext 00100010 00011000 00100010 00101000 00100001 01000010

00100010 00100001 00100001 00011000 00100001 01000001

57. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight

58. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight

59. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight

Cryptography.doc

CSCI 1321

60. ________________________ Which of the three P-Boxes above would be of little use encrypting text
and graphic information because of the data loss.

61.

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Use the expanded p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
encrypt the plaintext = NUT. Remember to complete the last byte by filling in 0s.

62. ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the expanded p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
decrypt the ciphertext = 00010111 10010100 00010101 01010100. Remember to
complete the last byte by filling in 0s.

63.

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___

___ ___ ___ ___ ___ ___ ___ ___


Use the straight p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
encrypt the plaintext = NUT.

Cryptography.doc

64.

10

CSCI 1321

___ ___ ___ ___ ___ ___ ___ ___

= ___ ___ ___ ___ ___ ___ ___ ___ = ____

___ ___ ___ ___ ___ ___ ___ ___

= ___ ___ ___ ___ ___ ___ ___ ___ = ____

___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the straight p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
decrypt the ciphertext = 00101111 10100001 10100111. Remember to complete the last
byte by filling in 0s.

65.

G = ___ ___ ___ ___ ___ ___ ___ ___

= ___ ___ ___ ___ ___ ___ ___ ___

O = ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___
Use the S-box encoder above, and the ASCII table at the beginning of this assignment sheet, to encrypt
the plaintext = GO.

Cryptography.doc

66. ___ ___ ___ ___ ___ ___ ___ ___

11

CSCI 1321

= ___ ___ ___ ___ ___ ___ ___ ___ = ____

___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the S-box encoder above, and the ASCII table at the beginning of this assignment sheet, to decrypt
the ciphertext = 10110001 10110000.

67. __________________________________ The bit-level encryption diagram above illustrates a(n) _?


_.
68. In the table for an Exclusive OR, the following hold true:
Exclusive OR (0,0) = _____ {0/1}

Exclusive OR (0,1) = _____{0/1}

Exclusive OR (1,0) = _____{0/1}

Exclusive OR (1,1) = _____{0/1}

69. In the table for an OR, the following hold true:


OR (0,0) = _____ {0/1}

OR (0,1) = _____{0/1}

OR (1,0) = _____{0/1}

OR (1,1) = _____{0/1}

Cryptography.doc

12

CSCI 1321

N =

___ ___ ___ ___ ___ ___ ___ ___

Y =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

E =

___ ___ ___ ___ ___ ___ ___ ___

T =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

70. _______________________________________________________________________ Use the


Exclusive OR bit-level encryption to encrypt plaintext = NYET with the Key 1 1 1 0 0 1 1 1 List the complete
Cyphertext message in the space provided.
CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

CipherChar =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

Key =

___ ___ ___ ___ ___ ___ ___ ___

Char1

___ ___ ___ ___ ___ ___ ___ ___

Char2 =

___ ___ ___ ___ ___ ___ ___ ___

71. _______________________________________________________________________ Use the


Exclusive OR bit-level encryption to encrypt plaintext = 10101001 10101000 with the Key 1 1 1 0 0 1 1 1
List the complete Ciphertext message in the space provided.
C =

___ ___

___

___

___

___

___

___

[R1] =

___ ___

___

___

___

___

___

___

[R2] =

___ ___

___

___

___

___

___

___

[R3] =

___ ___

___

___

___

___

___

___

___ ___

___

___

___

___

___

___

[R1] =

___ ___

___

___

___

___

___

___

[R2] =

___ ___

___

___

___

___

___

___

[R3] =

___ ___

___

___

___

___

___

___

S =

72. _______________________________________________________________________ Use the Rot bitlevel encryption to encrypt plaintext = CS with the Key = 3 List the complete Ciphertext message in the
space provided.
C =

___ ___

___

___

___

___

___

___

[R1] =

___ ___

___

___

___

___

___

___

[R2] =

___ ___

___

___

___

___

___

___

[R3] =

___ ___

___

___

___

___

___

___

Cryptography.doc

S =

13

CSCI 1321

___ ___

___

___

___

___

___

___

[R1] =

___ ___

___

___

___

___

___

___

[R2] =

___ ___

___

___

___

___

___

___

[R3] =

___ ___

___

___

___

___

___

___

73. _______________________________________________________________________ Use the Rot bitlevel encryption to decrypt plaintext = CS with the Key = 3 List the complete Ciphertext message in the
space provided.
74. S__________________________________ According to the slides, one of the major disadvantages of
monoalphabetic algorithms is that they are not very S_?_.
75. F__________________________________ According to the slides, one of the major disadvantages of
monoalphabetic algorithms is that they do not hide the natural F_?_ of a language.
76. S__________________________________ According to the slides, one of the major disadvantages of
polyalphabetic algorithms is that they are not very S_?_.
77. _______ {T/F} Polyalphabetic algorithms do a better job hiding the character frequencies of a language
than monoalphabetic algorithms.
78. S__________________________________ According to the slides, one of the major disadvantages of
transpositional algorithms is that they are not very S_?_.
79. F__________________________________ According to the slides, one of the major disadvantages of
transpositional algorithms is that they preserve the natural F_?_ of a language.

80. _______________________________________________________________________ IBMs nonmilitary encryption algorithm above is called _?_..


81. D_______________________ E______________________ S______________________ DES is an
acronym for D_?_ E_?_ S_?_
.

Cryptography.doc

14

CSCI 1321

82. _______________________________________________________________________ The illustration


above describes one possible combination of subkeys for the _?_ encryption algorithm .
83. The slides describe 4 major weaknesses of conventional encryption/decryption. List them.
The conventional encryption algorithm is always some variation of the I______________________ of the
decryption algorithm & visa versa.
.
Any one who know the conventional encryption algorithm can D____________________________ the
decryption algorithm. Both parts must be kept secret!
The conventional algorithm is secure if and only if both sides of the A_______________________ are
safe if used in a banking algorithm, any client could potentially crack the bank portion!
Conventional algorithms do not provide an easy solution for a ___________ {one, many} to __________
{one, many} application; a banking application would require thousands of algorithms with thousands of
corresponding keys.
84. _______ {T/F} The public-key encryption algorithm is always some variation of the inverse of the
decryption algorithm & visa versa.
85. _______ {T/F} The conventional encryption algorithm is always some variation of the inverse of the
decryption algorithm & visa versa.
86. _______ {T/F} The public encryption algorithm anyone can encrypt, but only the authorized receiver
should be able to decrypt.
87. _______ {T/F} In public encryption, knowing the encryption algorithm compromises the decryption
algorithm.
88. _______ {T/F} In conventional encryption, knowing the encryption algorithm and the key makes it quite
easy to crack the decryption algorithm.

Cryptography.doc

15

CSCI 1321

89. _______ {T/F} In public-key encryption, knowing the encryption algorithm and the key makes it quite easy
to crack the decryption algorithm.
90. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 5 and 17. What is N?
91. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 7 and 17. What is N?
92. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 5 and 17. What is Z?
93. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 7 and 17. What is Z?
94. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 5 and 17. Prime Factor 64? What would be the lowest prime number that would be relatively
prime to 64 that might be selected for Kp.
95. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 17. Prime Factor 96? What would be the lowest prime number that would be relatively
prime to 96 that might be selected for Kp.
96. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 23. Prime Factor 132? What would be the lowest prime number that would be relatively
prime to 132 that might be selected for Kp.
97. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 5 and 17. Suppose Kp = 3. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
98. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 17. . Suppose Kp = 5. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
99. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 23. . Suppose Kp = 3. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
100. D_______________________ E______________________ S______________________ DES is an
acronym for D_?_ E_?_ S_?_

You might also like