Professional Documents
Culture Documents
doc
CSCI 1321
You must do at least 90% of this homework without the assistance of anyone else. Once you have 90% or
more of the homework completed, you may double check your answers with a team-mate or study-partner.
I have completed at least 90% this homework assignment on my own. I/We realize that it is a violation of
academic integrity to share this work with others, either this semester, or after the class is over.
I/We realize that the penalty for turning in work that is not my own, or assisting others in doing so, can range
from an "F" in the class to dismissal from Trinity University
Print Name _________________________________________
Signature _______________________________________________________________
Team-Mate Name __________________________________________________________
Cryptography
Homework
15 Points
Cryptography.doc
A)
B)
C)
D)
CSCI 1321
P-box
Vigenere cipher
S-box
Product block
Cryptography.doc
B)
C)
D)
CSCI 1321
Ciphertext
Cryptonite
Plaintext
24. ______________________-key
25. The three upper layers of the OSI Model are the A_?_ layer, the P _?_ layer, and the S_?_ layer,
A______________________ P_____________________ S_____________________
26. ____________________________ The upper layers of the OSI Model are implemented with _?_
{Software/Hardware}.
27. ____________________________ In the OSI Model, the _?_ layer establishes, maintains, &
synchronizes between communicating upper layers.
28. ____________________________ In the OSI Model, the _?_ layer would handle with problems such as
inadequate disk space and no paper in printer; these functions would often be included in the operating
system software.
29. ____________________________ The services of the _?_ layer, in the OSI model, would include
coordinating connection & disconnection of dialogs between applications, providing synchronization points
for data exchange, coordinating who sends & when, and ensuring that the data exchange is complete before
the session gracefully closes.
30. Which of the four components of the Presentation Layer would concern itself with making sure that the
ASCII user deals with ASCII info and the EBCDIC user deals with EBCDIC info.
Cryptography.doc
CSCI 1321
A) Translation
B) Encryption/Decryption
C) Authentication
D) Compression
client.
33. ______________________________ In cryptography, the sender uses an _?_ key to transform
plaintext into encrypted ciphertext.
34. ______________________________ In cryptography, the receiver uses a _?_ key to transform
ciphertext back into the original plaintext
35. S ______________________________ T______________________________ The two earliest and
simplest classifications of symmetric-key cipher algorithms are _?_ and _?_.
36. M _____________________ P_____________________ T_____________________ The
symmetric-key substitution algorithm simply substitutes one symbol with another using character-level
encoding. Three of the major substitution algorithms classifications of these are M_?_ or P_?_ or T_?_.
37. _____ In the _?_ ciphers, a character in the plaintext is always changed to the same character in the
ciphertext, regardless of its position in the text. For example, an A is always changed to a D.
A) Monoalphabetic,
B) Polyalphabetic
C Transpositional
D) Bit-Level
Cryptography.doc
CSCI 1321
Cryptography.doc
CSCI 1321
47. ________ In polyalphabetic substitution, the relationship between a character in the plaintext and a
character in the ciphertext is _?_.
A) one-to-one
B) one-to-many
C) many-to-one
D) one-to-many
Plaintext
Ciphertext
48. Using the eleven character transpositional cipher key above, encrypt the ciphertext message
CRYPTOGRAPHY IS THE ART AND SCIENCE OF TRANSFORMING MESSAGES TO MAKE THEM
SECURE AND IMMUNE TO ATTACKS. Place the continuous flow plaintext on the left and transform it to
appropriate ciphertext on the right.
Ciphertext
Plaintext
49. Using the eleven character transpositional cipher key above, decrypt the ciphertext message
Cryptography.doc
CSCI 1321
50. _______ {T/F} In symmetric-key cryptography, the same key is used by the sender (for encryption) and
the receiver (for decryption).
51. _______________________________________________________________________________ One
of the major advantages of symmetric-key cryptography is efficiency. Why are these small keys more
efficient?
52. ________________________________ One of the major disadvantages of symmetric-key
cryptography is that each pair must have a unique symmetric key. If N people want to use this method, there
needs to be _?_ symmetric keys. List the formula.
53. _____________________ In the _?_ cipher all data [text, graphics, audio, & video] is divided into
blocks of bits and substituted in accordance with some key.
A) Monoalphabetic,
B) Polyalphabetic
C) Transpositional
D) Bit-Level
54.
Use the bit-level encoder above, and the ASCII table at the beginning of this assignment sheet, to encrypt
the plaintext = NETWORK
55. _______ {T/F} In symmetric-key cryptography, different keys is used by the sender (for encryption) and
the receiver (for decryption).
56. S______________________________
Cryptography.doc
00100010
00100010
00100001
00100010
00100001
00100001
00011000
00101000
01000010
00100001
00011000
01000001
=
=
=
=
=
=
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
CSCI 1321
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
___
= _S_
= ___
= ___
= ___
= ___
= ___
Use the bit-level decoder above, and the ASCII table at the beginning of this assignment sheet, to decrypt
the ciphertext 00100010 00011000 00100010 00101000 00100001 01000010
57. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight
58. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight
59. ____ The _?_ P-Box above is used for bit-level encryption and decryption.
A) Compressed
B) Expanded
C) Straight
Cryptography.doc
CSCI 1321
60. ________________________ Which of the three P-Boxes above would be of little use encrypting text
and graphic information because of the data loss.
61.
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ ___
Use the expanded p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
encrypt the plaintext = NUT. Remember to complete the last byte by filling in 0s.
62. ___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
___ ___ ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the expanded p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
decrypt the ciphertext = 00010111 10010100 00010101 01010100. Remember to
complete the last byte by filling in 0s.
63.
Cryptography.doc
64.
10
CSCI 1321
___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the straight p-box encoder above, and the ASCII table at the beginning of this assignment sheet, to
decrypt the ciphertext = 00101111 10100001 10100111. Remember to complete the last
byte by filling in 0s.
65.
O = ___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___
Use the S-box encoder above, and the ASCII table at the beginning of this assignment sheet, to encrypt
the plaintext = GO.
Cryptography.doc
11
CSCI 1321
___ ___ ___ ___ ___ ___ ___ ___ = ___ ___ ___ ___ ___ ___ ___ ___ = ____
Use the S-box encoder above, and the ASCII table at the beginning of this assignment sheet, to decrypt
the ciphertext = 10110001 10110000.
OR (0,1) = _____{0/1}
OR (1,0) = _____{0/1}
OR (1,1) = _____{0/1}
Cryptography.doc
12
CSCI 1321
N =
Y =
Key =
Key =
CipherChar =
CipherChar =
E =
T =
Key =
Key =
CipherChar =
CipherChar =
CipherChar =
Key =
Key =
Char1
Char2 =
___ ___
___
___
___
___
___
___
[R1] =
___ ___
___
___
___
___
___
___
[R2] =
___ ___
___
___
___
___
___
___
[R3] =
___ ___
___
___
___
___
___
___
___ ___
___
___
___
___
___
___
[R1] =
___ ___
___
___
___
___
___
___
[R2] =
___ ___
___
___
___
___
___
___
[R3] =
___ ___
___
___
___
___
___
___
S =
72. _______________________________________________________________________ Use the Rot bitlevel encryption to encrypt plaintext = CS with the Key = 3 List the complete Ciphertext message in the
space provided.
C =
___ ___
___
___
___
___
___
___
[R1] =
___ ___
___
___
___
___
___
___
[R2] =
___ ___
___
___
___
___
___
___
[R3] =
___ ___
___
___
___
___
___
___
Cryptography.doc
S =
13
CSCI 1321
___ ___
___
___
___
___
___
___
[R1] =
___ ___
___
___
___
___
___
___
[R2] =
___ ___
___
___
___
___
___
___
[R3] =
___ ___
___
___
___
___
___
___
73. _______________________________________________________________________ Use the Rot bitlevel encryption to decrypt plaintext = CS with the Key = 3 List the complete Ciphertext message in the
space provided.
74. S__________________________________ According to the slides, one of the major disadvantages of
monoalphabetic algorithms is that they are not very S_?_.
75. F__________________________________ According to the slides, one of the major disadvantages of
monoalphabetic algorithms is that they do not hide the natural F_?_ of a language.
76. S__________________________________ According to the slides, one of the major disadvantages of
polyalphabetic algorithms is that they are not very S_?_.
77. _______ {T/F} Polyalphabetic algorithms do a better job hiding the character frequencies of a language
than monoalphabetic algorithms.
78. S__________________________________ According to the slides, one of the major disadvantages of
transpositional algorithms is that they are not very S_?_.
79. F__________________________________ According to the slides, one of the major disadvantages of
transpositional algorithms is that they preserve the natural F_?_ of a language.
Cryptography.doc
14
CSCI 1321
Cryptography.doc
15
CSCI 1321
89. _______ {T/F} In public-key encryption, knowing the encryption algorithm and the key makes it quite easy
to crack the decryption algorithm.
90. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 5 and 17. What is N?
91. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 7 and 17. What is N?
92. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 5 and 17. What is Z?
93. ________________________________________ Suppose the RSA public key encryptions prime
numbers were 7 and 17. What is Z?
94. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 5 and 17. Prime Factor 64? What would be the lowest prime number that would be relatively
prime to 64 that might be selected for Kp.
95. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 17. Prime Factor 96? What would be the lowest prime number that would be relatively
prime to 96 that might be selected for Kp.
96. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 23. Prime Factor 132? What would be the lowest prime number that would be relatively
prime to 132 that might be selected for Kp.
97. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 5 and 17. Suppose Kp = 3. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
98. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 17. . Suppose Kp = 5. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
99. _________________________________ _______ Suppose the RSA public key encryptions prime
numbers were 7 and 23. . Suppose Kp = 3. What would be the lowest Ks such that (Kp x Ks ) Mod Z = 1?
100. D_______________________ E______________________ S______________________ DES is an
acronym for D_?_ E_?_ S_?_