You are on page 1of 1

IT7020 Cryptography Module

Module 3 Assignment
Solve the following questions
1- Suppose Alice wishes to send the message "Welcome to Cybersecurity" to Bob. Use simple
substitution cipher using n=10 to encrypt the message.

2- Given that the Caesar’s cipher is used, find the plaintext from the ciphertext:
LOLYHLQFLQFLQQDWL

3- Suppose Alice wishes to send the message "HELLO" to Bob, suppose Eve intercepts Alice's
ciphertext: "EQNVZ". If Eve had infinite computing power, she would quickly find that the
key is one of the following:
a. MKFCH
b. XMCKL
c. RTHJS
Could you help Eve to select the correct key? ( Hint: use the Vigenère Cipher to decrypt the
ciphertext to the original message and from you will get the index of each letter of the key.
Finally, convert the indexes into the corresponding letter to find the correct key).

4- Using the letter encodings in the Abbreviated Alphabet table below, the following two
ciphertext messages were encrypted with the same one-time pad cipher
KHHLTK
KTHLLE
Find possible plaintexts for each message and the corresponding one-time pad.

(Please see “How to solve Vernam Cipher question” word file in the “How to do” shared folder)

5- Use the Playfair cipher to encrypt the message "Hide the gold" using the word "Information"
as the key. (Hint: Ignore spaces when encrypting the message i.e. consider the message to be
"HideTheGold ")

6- What is a Feistel Cipher? Why is the Tiny Encryption Algorithm, TEA, not a Feistel Cipher?
Why is TEA “almost” a Feistel Cipher?

You might also like