You are on page 1of 6

College of Computing and Information Technology, Heliopolis

CS/IS421: Security assignment Period:6 hrs.


__________________________________________________________________________________________________________________
Name:…………………………………………………………………... ID:……………….
________________________________________________________________________________________________________
Question#1 (6 points )

Page|1
E C.T
P.T
&”202
”0
P.T= “your last name” & “1999”
E= play fair algorithm (6x6) with keyword= “security2211”

Find: The detailed steps of E(P.T) to get C.T

THE ANSWETR
------------------------------------------------------------------------------------------------------

Page|2
Question (2): ESSAY (9 points)
Note: you can use the text book uploaded in cortex and PPT to answer the essay questions:

A) In AES cipher, each round contains 4 transformation processes. Fill the following empty cells
in the following table:

Process Name Operation type (Substitution/Permutation)

1-………………………………………………... ………………………………………………...
2-………………………………………………... ………………………………………………...
Page|3
3-………………………………………………... ………………………………………………...
4-………………………………………………... ………………………………………………...

B) Discuss the chosen parameters and design features that Feistel structure symmetric block
cipher depends on. (Text book -Chapter 2).

THE ANSWETR
------------------------------------------------------------------------------------------------------

Page|4
C) Discuss the following substitution ciphers: Monoalphabetic, Play Fair, and Vigenère from the
security analysis view. Then sort them according the best security algorithm till the worst
one.
THE ANSWETR
------------------------------------------------------------------------------------------------------

Page|5
Page|6

You might also like