Professional Documents
Culture Documents
Page|1
E C.T
P.T
&”202
”0
P.T= “your last name” & “1999”
E= play fair algorithm (6x6) with keyword= “security2211”
THE ANSWETR
------------------------------------------------------------------------------------------------------
s e c u r i
t y 2 1 a b
d f g h j k
l m n o p q
v w x z 0 3
4 5 6 7 8 9
MONP
HA-> J1
ME-> WY
D1 ->HT
9X->63
9X->63
9X->63
C.T
Page|2
A) In AES cipher, each round contains 4 transformation processes. Fill the following empty cells
in the following table:
1-………Subbytes…………... ……………Substitution…………...
2-………Addroundkeys…………………... ……………Substitution………………...
3-……………Mix columns…………………... ………………Permutation………………...
4-……………Shift rows…………………... …………Permutation……………………...
B) Discuss the chosen parameters and design features that Feistel structure symmetric block
cipher depends on. (Text book -Chapter 2).
THE ANSWETR
------------------------------------------------------------------------------------------------------
C) Discuss the following substitution ciphers: Monoalphabetic, Play Fair, and Vigenère from the
security analysis view. Then sort them according the best security algorithm till the worst
one.
THE ANSWETR
------------------------------------------------------------------------------------------------------
Sorting:
1- Vigenère
2- Play Fair
Page|3
3- Monoalphabetic
Vigenère:
• Vigenere has multiple ciphertext letter for
the same plaintext letter
• Hence letter frequencies are obscured (but not
totally lost).
Play Fair:
security much improved over monoalphabetic
since has 36x 36= 1296 diagrams
• would need a 1296 entry frequency table to analyse
(verses 26 for a monoalphabetic) .
• Was widely used for many years (e.g. US & British
military in WW1)
Monoalphabetic:
• Now have a total of 26! keys
• With so many keys, might think the system is secure.
But would be !!!WRONG!!!
• Problem is because of the regularities of the language
Page|4
Page|5