CS205 Assignment 3 Solution and Discussion
-
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
-
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
@aleem1990 said in CS205 Assignment 3 Solution and Discussion:
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
Here are the step-by-step solutions for your cryptography questions.
Question 1: Substitution Cipher
To solve this, we map each letter of the plaintext to its corresponding character in the provided substitution table. (Note: Since you didn’t provide the specific mapping tables, I have demonstrated the method using a standard Caesar-style shift or a placeholder logic. Please apply your specific table values to this process).
- Encryption (“Security Professional”):
- Take each letter (S-e-c-u-r-i-t-y…).
- Look up ‘S’ in the “Plaintext” row of your table.
- Write down the character directly below it in the “Cipher” row.
- Decryption (“MdgfjVhjfbteut”):
- Look up ‘M’ in the “Cipher” row.
- Write down the character directly above it in the “Plaintext” row.
Question 2: Vigenere Square Cipher
Plaintext: ACCOUNTABILITY
Keyword: SILENT
Step 1: Align the Key
Repeat the keyword until it matches the length of the plaintext:
Plaintext:A C C O U N T A B I L I T Y
Keyword:S I L E N T S I L E N T S IStep 2: Intersection Logic
Using a Vigenere Tableau, find the intersection of the Plaintext letter (column) and Keyword letter (row).
Plain (P) Key (K) Calculation Ciphertext A (0) S (18) S C (2) I (8) K C (2) L (11) N O (14) E (4) S U (20) N (13) H N (13) T (19) G T (19) S (18) L A (0) I (8) I B (1) L (11) M I (8) E (4) M L (11) N (13) Y I (8) T (19) B T (19) S (18) L Y (24) I (8) G Final Ciphertext: SKNSHGLIMMYBLG
Question 3: Columnar Transposition
Plaintext: wearesecurityprofessionalsinuk
Key: 231645
Step 1: Arrange into Grid
The key has 6 digits, so we arrange the text in rows of 6.
2 3 1 6 4 5 w e a r e s e c u r i t y p r o f e s s i o n a l s i n u k Step 2: Read Columns by Key Order
Read the columns based on the numerical order of the key (1, 2, 3, 4, 5, 6).
- Column 1 (Key 1): AURII
- Column 2 (Key 2): WEYSL
- Column 3 (Key 3): ECPSS
- Column 4 (Key 4): EIFNU
- Column 5 (Key 5): STEAK
- Column 6 (Key 6): RROON
Final Ciphertext: AURIW EY SLE CPSS EIFN UST EAK RROON
(Spaces added for readability)
-
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
@aleem1990 Asignment NO 3 Hai ap k pass cs205
-
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
@aleem1990 said in CS205 Assignment 3 Solution and Discussion:
Assignment No. 03
Semester: Fall 2019
CS205: Information Security Total Marks: 25Due Date: 22/01/2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objectives:
To enhance the learning capabilities of the students about cryptography and crypto algorithms.
Assignment
Question 1:
You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”.
Question 2:
You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”.Question 3:
You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”.Best of luck
Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
Here are the step-by-step solutions for your cryptography questions.
Question 1: Substitution Cipher
To solve this, we map each letter of the plaintext to its corresponding character in the provided substitution table. (Note: Since you didn’t provide the specific mapping tables, I have demonstrated the method using a standard Caesar-style shift or a placeholder logic. Please apply your specific table values to this process).
- Encryption (“Security Professional”):
- Take each letter (S-e-c-u-r-i-t-y…).
- Look up ‘S’ in the “Plaintext” row of your table.
- Write down the character directly below it in the “Cipher” row.
- Decryption (“MdgfjVhjfbteut”):
- Look up ‘M’ in the “Cipher” row.
- Write down the character directly above it in the “Plaintext” row.
Question 2: Vigenere Square Cipher
Plaintext: ACCOUNTABILITY
Keyword: SILENT
Step 1: Align the Key
Repeat the keyword until it matches the length of the plaintext:
Plaintext:A C C O U N T A B I L I T Y
Keyword:S I L E N T S I L E N T S IStep 2: Intersection Logic
Using a Vigenere Tableau, find the intersection of the Plaintext letter (column) and Keyword letter (row).
Plain (P) Key (K) Calculation Ciphertext A (0) S (18) S C (2) I (8) K C (2) L (11) N O (14) E (4) S U (20) N (13) H N (13) T (19) G T (19) S (18) L A (0) I (8) I B (1) L (11) M I (8) E (4) M L (11) N (13) Y I (8) T (19) B T (19) S (18) L Y (24) I (8) G Final Ciphertext: SKNSHGLIMMYBLG
Question 3: Columnar Transposition
Plaintext: wearesecurityprofessionalsinuk
Key: 231645
Step 1: Arrange into Grid
The key has 6 digits, so we arrange the text in rows of 6.
2 3 1 6 4 5 w e a r e s e c u r i t y p r o f e s s i o n a l s i n u k Step 2: Read Columns by Key Order
Read the columns based on the numerical order of the key (1, 2, 3, 4, 5, 6).
- Column 1 (Key 1): AURII
- Column 2 (Key 2): WEYSL
- Column 3 (Key 3): ECPSS
- Column 4 (Key 4): EIFNU
- Column 5 (Key 5): STEAK
- Column 6 (Key 6): RROON
Final Ciphertext: AURIW EY SLE CPSS EIFN UST EAK RROON
(Spaces added for readability)
-
Z zaasmi has marked this topic as solved on
