You are on page 1of 6

Assignment No.

02
Cyber Law – CS204
Name khalid farooq
Roll no BC190410864

Question.1

Use the caesar cipher method to encrypt the following words with shift key of 3 and show the
complete process step by step.

 “ASSIGNMENT”
 “TOOLS”
Ans.
View enlist the following alphabet mention below

ABCDEFGHIJKLMNOPQRSTUVWXYZ

We need to encode the plain text in order to allot the number to plain text so I assigned 0 as A
and Z as 25.

0 1 2 3 4 5 6 7 8 9 1 1 12 13 1 1 16 1 1 1 20 2 22 23 2 25
0 1 4 5 7 8 9 1 4
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

In this table at number 4 E alphabet is there so we will shift the E at the place of B, in the third
row the cipher text is presented by small letter alphabet

0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e

This method is solved by third step or shift 3 method so I use the following method
Shift 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d
Shift 2
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d E
Shift 3
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e f

Shift 4
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g

Shift 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h

Shift 6
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i

Shift 7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j

Shift 8
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k

Shift 9
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 19 20 21 22 23 24 25
8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l

Shift 10
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m

Shift 11
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n

Shift 12
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o
Shift 13
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p
Shift 14
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q
Shift 15
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r
Shift 16
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s
Shift 17
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t
Shift 18
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u
Shift 19
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 1 20 21 22 23 24 25
1 5 7 8 9
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v
Shift 20
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w
Shift 21
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x

Shift 22
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x y
Shift 23
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x y z
Shift 24
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x y z a
Shift 25
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x y z a B
Shift 26
0 1 2 3 4 5 6 7 8 9 10 1 12 13 14 1 16 1 1 19 20 21 22 23 24 25
1 5 7 8
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
d e F g h i j k l m n o p q r s t u v w x y z a b c
Clipper text alphabet
The required encryption is ASSIGNMENT
A S S I G N M E N T
d v v i j q p h q w

The final clipper text format result is dvvijqphqw


The final encrypted text is Ceaser cipher is DVVIJPHQW
And same as TOOLS
T O O L S
w r r o v

The final clipper text format result is wrrov


The final encrypted text is Ceaser cipher is WRROV

Question. 2

Suppose that if you've ever tried to login to your online bank account and find that not all of your
savings are being accounted for, it could be an indication that you've been targeted by cyber
criminal. Although there are several ways that cyber criminals could have gotten your account
data, there's a fair chance you've accidentally come across a phishing website in the past,
misinterpreting the login page of your online bank. Enlist all possible security measures to
protect your online banking account from cyber criminals.

Preventive measure
Use the genuine antivirus or software
Avoid using public wi-fi or VPN software
Check for latest update software
Change password regularly
Subscribe the mobile notification
Multi factor authentication factor
Multi authentication factor require two of the following to be simultaneously presented for user
authentication some you know relevant to password or any other nick name or relevant to your
specific
Credential confidentiality
Credential confidentiality is script principle that control access to information. It is design to
ensure wring people cannot access the information and right must access the information

You might also like