Professional Documents
Culture Documents
Part II
Week 04 – Security in Computing
Revision
• Analyzed the underlying concepts of cryptography such as symmetric and asymmetric encryption and their
components.
• Understood the three independent dimensions of cryptographic systems.
• Understood the concepts of unconditional and computational security.
• Analyzed the working principle of the Caesar substitution cipher.
Rule 03. Plain text letters in the same column are replaced by the
letters below (mu -> cm).
Rule 04. Else, each plaintext letter in a pair is replaced by the letter
that lies in its own row and column occupied by other plain text
letter (hs -> bp).
M E M A T R H T G P R Y
E T E F E T E O A A T
Matrix: 2 x 23
• Hence, cipher text: TTNA APTM TSUO AODW COIX KNLY PETZ