- Military Cryptography
- 2 Classical Encryption
- Fauzan Saeed†, Abdul Basit Abdul Qadir††, Yar M.Mughal†††, Mustafa Rashid††††
- Network security MCqs
- Cryptography1 Intro PA5
- chapter ii
- Cryptography Tutorial
- crypto_outreach1_2
- Cipher
- IJCIS 020405
- T.voluntario Criptología (Traducido)
- The Sorcerer’s Apprentice Guide to Fault Attacks
- Design and ASIC Implementation of Modified Rijndael Cipher
- Solution Lab Crypto
- Cryptography Tutorial
- chapter-3-symmetric-key-crypto-stream-ciphers-block-ciphers-block-cipher.ppt
- A System for Secure Transfer of Data Using Image Steganography
- crypto-02
- PCI DSS Glossary v3
- Crypto Presentation
- 65781329488348
- sg248249_IBMi7.2
- cns final
- Intro2
- Leakage-Resilient Cryptography: A Survey of Recent Advances
- Encryption Decryption
- Ppt
- fips1401
- Project Info
- De.security Problem
- Non Linear Waves
- HRPP488-Breaking Wave Loads at Vertical Seawalls
- Froude Scaling
- Offshore Wind Turbine Design
- c06 Calm Buoy
- AutoPIPE_ProductDataSheet
- Service Overview and Validation
- DSHur_numerical Estimation of Wave Force_three Dim_ Body
- Wave
- Handbook Phd Uib 1
- 2546
- ubc_1994-953810
- NM 436 Dynamics of Offshore Structures
- CFD Level Set
- SparVIMWkshp-FinalReport Draft
- Methods to Track Moving Fluid Interfaces

Submission Deadline: 08:00 am, Wednesday, Sept. 21, 2016

1

Warning: Although the encryption techniques used in this assignment are extremely primitive compared to practical encryption schemes used in the real world. Sept. 2 of 6 Due Wednesday. Blank spaces were first deleted and then inserted at convenient locations. The plaintext message “AB ABAB ABA” (with spaces) might be converted to the ciphertext “XYXYX YXYX”. Problem. they are not necessarily easy to solve (even with computer assistance). Poly-alphabetic Ciphers For this part of the project. sSppose that substitution 1 maps A to X. The text was enciphered using a polyalphabetic substitution cipher. You might consider using the statistical analysis techniques discussed in class to crack these problems. you are given enciphered English text and a hint about the encryption algorithm that was used. 2016 . you will try your skills at cracking some encrypted messages. Spaces were removed before encryption and reinserted after encryption. Start early! Part I. and substitution 2 maps B to Y. where the key length was no larger than 6. FRRUU OIIYE AMIRN QLQVR BOKGK NSNQQ IUTTY IIYEA WIJTG LVILA ZWZKT ZCJQH IFNYI WQZXH RWZQW OHUTI KWNNQ YDLKA EOTUV XELMT SOSIX JSKPR BUXTI TBUXV BLNSX FJKNC HBLUK PDGUI IYEAM OJCXW FMJVM MAXYT XFLOL RRLAA JZAXT YYWFY NBIVH VYQIO SLPXH ZGYLH WGFSX LPSND UKVTR XPKSS VKOWM QKVCR TUUPR WQMWY XTYLQ XYYTR TJJGO OLMXV CPPSL KBSEI PMEGC RWZRI YDBGE BTMFP ZXVMF MGPVO OKZXX IGGFE SIBRX SEWTY OOOKS PKYFC ZIEYF DAXKG ARBIW KFWUA SLGLF NMIVH VVPTY IJNSX FJKNC HBLUK PDGUI IYEAM HVFDY CULJS EHHMX LRXBN OLVMR Hints In the ciphertext the letters were first converted to upper casethus the alphabet substitutions consist of permutations of the 26 upper case letters A through Z. 21.DAT 510-Security and Vunlerability in Networks Assignment 1 Cryptanalysis of primitive ciphers In this project. Your mission: Develop the necessary (software) tools and use them to help you produce plaintext.

(Note however. p))) 3 of 6 (1) Due Wednesday. due to Moores law. Simplified DES In this section.DAT 510-Security and Vunlerability in Networks Assignment 1 Part II. EncDES (k1 . DecDES (k2 . However. known as Triple DES uses two 56-bit raw keys k1 and k2 and is implemented by composing DES with itself three times in the following way: Enc3DES (p) = EncDES (k1 . the increase in computing power makes it more tractible to brute-force crack a 56-bit key. that SDES is in no way secure and should not be used for serious cryptographic applications. SDES encryption takes a 10 bit raw key (from which two 8 bit keys are generated as described in the handout) and encrypts an 8 bit plaintext to produce an 8 bit ciphertext. an alternative version of DES using longer keys was desirable. Use your implementation to complete the following table: Raw Key Plaintext Ciphertext 0000000000 00000000 ? 1111111111 11111111 ? 0000011111 00000000 ? 0000011111 11111111 ? 1000101110 ? 00011100 1000101110 ? 11000010 0010011111 ? 10011101 0010011111 ? 10010000 The DES algorithm uses keys of length 56 bits. Thus. it is called SDES. you will implement a simplified version of the DES block cipher algorithm. The result. To verify that your implementation of SDES is correct. 21. try the following test cases: Raw Key Plaintext Ciphertext 0000000000 10101010 00010001 1110001110 10101010 11001010 1110001110 01010101 01110000 1111111111 10101010 00000100 Task 1. Sept. when DES was originally designed. which. 2016 . and it is designed to have the features of the DES algorithm but scaled down so it is more tractable to understand.) The photocopied handouts that accompany this project description give the detailed specifications of SDES. was thought to be secure enough to meet most needs. Naturally enough.

Decrypt it. Implement a class called TripleSDES and complete the following table Raw Key 1 Raw Key 2 Plaintext Ciphertext 0000000000 0000000000 00000000 ? 1000101110 0110101110 11010111 ? 1000101110 0110101110 10101010 ? 1111111111 1111111111 10101010 ? 1000101110 0110101110 ? 11100110 1011101111 0110101110 ? 01010000 0000000000 0000000000 ? 10000000 Task 3. 21.txt was encoded using SDES. Decrypt it. DecDES (k1 . c))) (2) Task 2. EncDES (k2 . and find the two 10-bit raw keys used for its encryption. The TripleDES decryption algorithm is just the reverse: Dec3DES (c) = DecDES (k1 . at the expense of perfoming three times as many calculations. 2016 . Cracking SDES and TripleSDES • The message in the file cxt1. EncDES is the usual DES encryption algorithm and DecDES is the DES decryption algorithm. 4 of 6 Due Wednesday. Sept. and find the 10-bit raw key used for its encryption. • The mesage in the file cxt2. The ciphertexts are obtained by encrypting the binary string converted from clear message with the standard ASCII code.DAT 510-Security and Vunlerability in Networks Assignment 1 Here. This strategy doubles the number of bits in the key. Hints.txt was encoded using TripleSDES. p is the plaintext to encrypt.

tar ⇒ *.zip. 5 of 6 Due Wednesday.tar. read. Note: The assignment is individual and can NOT be solved in groups.g. • You may use any reasonable programming language for part one of the assignment. 21.txt to your achieve file (e. 21.com ) or Chunlei Li (Email: chunlei. • Report should follow the formal report style guide in next page. describe any command-line arguments).zip format.itslearning. and will be considered missing. NOTE: If you encounter problem with upload archive file (e. Reasonable languages include: Java. 2016 . *. Sept. *. 2. A separate report with PDF format • Texts in the report should be readable by human.gz or . compressed directory in .no ). Source Code • this should be single.tar. you should be able to upload after you add extention . and recognizable by machine.g.li@uis. • you should NOT use available libraries/packages/classes for implementing the core functionality of the assignment.tar) to the website https://uis.txt).. • Other formats will NOT be opened. • the directory should contain a file called README that describes the contents of the directory and any special instructions needed to run your programs (i. 2016 (submit your assignment through itslearning) Final submission: 1. Python.DAT 510-Security and Vunlerability in Networks Assignment 1 Assignment Submission Deadline: 08:00 am. *. C++. Sept.com/. Wednesday. C.sebastian@gmail.e. and others with permission of Sebastian Pederson (Email: mland.

and analysis. • Describe the filtering strategy you used to know that the keys are correct. 6 of 6 Due Wednesday.your procedure. Works Cited A bibliography of all of the sources you got information from in your report. Part II • The result of test cases in Tasks 1 and 2. Part I • The plaintext message you managed to deciper. • The bits making up the keys of the SDES and TripleDES in Task 3. 21.DAT 510-Security and Vunlerability in Networks Assignment 1 Project Title Abstract A one-paragraph summary of the entire assignment . results. 2016 . Conclusion A short paragraph that restates the objective from your introduction and relates it to your results and discussion and describes any future improvements on your techniques that you would recommend. • Describe the strategy you employed. show sample output of these programs. Sept. describe any programs you wrote. and show how you transformed that output into your solution. show the details for each of the steps of that strategy.

- Military CryptographyUploaded bydikshant desai
- 2 Classical EncryptionUploaded byGalal Nadim
- Fauzan Saeed†, Abdul Basit Abdul Qadir††, Yar M.Mughal†††, Mustafa Rashid††††Uploaded byArif Nazeer
- Network security MCqsUploaded byfreefree
- Cryptography1 Intro PA5Uploaded byAmit Gupta
- chapter iiUploaded byapi-235904143
- Cryptography TutorialUploaded bybob
- crypto_outreach1_2Uploaded bySlow Hand
- CipherUploaded bySergio Mario Herreros
- IJCIS 020405Uploaded byijcisjournal
- T.voluntario Criptología (Traducido)Uploaded byMiriam Alonso
- The Sorcerer’s Apprentice Guide to Fault AttacksUploaded byBarry Simpson
- Design and ASIC Implementation of Modified Rijndael CipherUploaded byIRJET Journal
- Solution Lab CryptoUploaded bySyaza Ibrahim
- Cryptography TutorialUploaded bySaiTeja
- chapter-3-symmetric-key-crypto-stream-ciphers-block-ciphers-block-cipher.pptUploaded byperhacker
- A System for Secure Transfer of Data Using Image SteganographyUploaded byInternational Journal for Scientific Research and Development - IJSRD
- crypto-02Uploaded byFatin Nabihah Nilman
- PCI DSS Glossary v3Uploaded bycozzie907
- Crypto PresentationUploaded byPrajwal Khatiwada
- 65781329488348Uploaded byGheorghe Gheorghe
- sg248249_IBMi7.2Uploaded byAjay Kumar Akurathi
- cns finalUploaded byAnita Martin
- Intro2Uploaded byFosi Hulu
- Leakage-Resilient Cryptography: A Survey of Recent AdvancesUploaded byPriyanka Bose
- Encryption DecryptionUploaded bychamiyaa
- PptUploaded bySiddhant1741991
- fips1401Uploaded byIkhlasAmbiarGuntara
- Project InfoUploaded bySumesh Somu
- De.security ProblemUploaded byryaan

- Non Linear WavesUploaded byputhenkulam
- HRPP488-Breaking Wave Loads at Vertical SeawallsUploaded byputhenkulam
- Froude ScalingUploaded byputhenkulam
- Offshore Wind Turbine DesignUploaded byputhenkulam
- c06 Calm BuoyUploaded byputhenkulam
- AutoPIPE_ProductDataSheetUploaded byputhenkulam
- Service Overview and ValidationUploaded byputhenkulam
- DSHur_numerical Estimation of Wave Force_three Dim_ BodyUploaded byputhenkulam
- WaveUploaded byputhenkulam
- Handbook Phd Uib 1Uploaded byputhenkulam
- 2546Uploaded byputhenkulam
- ubc_1994-953810Uploaded byputhenkulam
- NM 436 Dynamics of Offshore StructuresUploaded byputhenkulam
- CFD Level SetUploaded byputhenkulam
- SparVIMWkshp-FinalReport DraftUploaded byputhenkulam
- Methods to Track Moving Fluid InterfacesUploaded byputhenkulam