You are on page 1of 5

SIR SYED UNIVERSITY OF ENGINEERING &

TECHNOLOGY

(Assignment#01)

“Cryptography and Network Security”

Submitted By
“Samra Shafiq”
“Ce-2018-083”

DEPARTMENT OF COMPUTER ENGINEERING


[16-11-2021]

1
Student ID__Ce-18-083____ Section _B______ Name ___Samrah Shafiq_____

Department: Computer Engineering Program: B.S (CE)


Assignment 1
CE-408 Cryptography and Network Security
Announced date: 11-09-2021 Due Date: 16-11-2021 Total Marks = 2
Marks Obtained =
Teacher Name: Shama Bano

Sr. No Course Learning Outcomes PLOs Blooms


Taxonomy
CLO_ Explain fundamental security objectives, security attacks, PLO_1 C2
1 services, and mechanisms (Engineering Knowledge) (Understanding)

CLO_ Apply various algorithms and security mechanisms to PLO_3 C3


2 provide confidentiality, integrity, and authentication (Design/Development of (Applying)
Solutions)

Question#01: CLO_1

Consider a medical report access system in which patients provide a reference number/username and
password (e.g., Agha Khan Laboratory etc.) to access their reports online. Give examples of
confidentiality, integrity, authenticity, and availability requirements associated with the system and, in
each case indicate the degree of the importance of the requirement.

Answer:-
Example of Confidentiality: -

The example of medical report access system of confidentiality is confidentiality is maintained for a
computer file if authorized users of agha khan laboratory can access their report online, while
unauthorized persons are blocked from accessing it. However, confidentiality associated with the system,
and it is very important factor that only authorized users have a access of report. And all unauthorized
person will be block.

Example of Integrity: -

The example of integrity for agha khan laboratory to access the medical report system online is integrity
means that data of laboratory is protected from unauthorized changes to ensure that it is reliable and
correct. If a data is changed by a third person (with no right on it), a data breach can be easily provoked.
Through integrity, data of report must be trustworthy. Its main objective is to make sure that a data will
stay undamaged it’s all life cycle and will be the same wherever it can be not to cause any disturbance to
information

Example of availability: -

2
Availability guarantees that online report systems, applications, and data are available to users when they
need them. The most common attack that impacts availability is denial-of-service in which the attacker
interrupts access to information, system, devices, or other network resources. Availability
means guaranteeing reliable access to information by authorized personnel. To be readily accessible, data
must be stored in a logical yet secure system. High availability aids rapid business processing and
ultimately benefits the organization like agha khan laboratory for the access of online report system.

Example Of Authenticity:

The example of authenticity in the medical report in which provides username and password the
Authentication technology provides access control for username or password by checking to see if a user's
credentials match the credentials in a database of authorized users or in a data authentication server. So,
the authenticity is very important for securing credential information like patient username or password
while to access the medical report system online.

Question#02(a):
Complete the following table with the help of “Ceasar Cipher”? CLO_2

KEY PLAIN TEXT CIPHER TEXT

Last digit of your Roll number NXFFHNNLNDFRQWLQRXN


successisacontinousjourneysodonotstop
MRXUQHBNRGRQRWNWRS
Key = 3

Middle letter of your name


EgyptsMubarakfromPovertytoThe
SAMRA=M=13
presidency
SO, Key=13

Decrypt half of the ciphertext with


your roll number and other half EUBDKLMJUITLVXXZSVUOANKOP exzmtwpfdlhtwwdpwwlelmwpenz
with last letter of your first name SVZHDWECY xafepc
(take mod where needed)

Sum of your roll number (e.g.,


sunshineandcloudsmixedshowersendin KMSDOLPCIYWXDKSFXQAWQ
019=0+1+9=10)
gbymidday DFZXPIGJYNPKQDZXWOOCL
(Take mod if needed)
083=0+8+3=11
Roll number *2
(Take mod if needed) COAOFBAVFCEBWVGWOYYFX mxkxplkfzmolcfqcxiiphbbmpclobz
83*2=166 RRCFWBERFOFGHAFUOAVRY xpqrkzexkdba
166 MOD 26=10
KEY=10

3
Question#02(b): Complete the following table with the help of “Polyalphabetic Ciphers: The Vigenere
Cipher”?

KEY PLAIN TEXT CIPHER TEXT

Your First name WEAREDISCOVEREDSAVEYOURS NOUVXBCYDEUVWXYCBUVXC


ELF DLOPJK
SAMRAH

Last name and first name


CVWAXNOPQUVWXAVDOIULKS VAQPUZGIUOIWNZUSXZCHCPXS
(e.g., your name: Ali khan)
XCPVIAXBOQZYQN VQQABIVST
Key = KhanAli
Key=SHAFIQSAMRAH
First name and the alphabet
you get from your roll
number

(e.g., Ali10=AliK, where SUNSHINEANDCLOUDSMIXEDSH DFYDSTYPLYONWOKJUVDEFG


10=K) OWERSENDINGBYMIDDAY HYTEWQAZXCMKLOUCXZEG

L=11

(SamrahL,11=L)

Your last name ZUVWLOPQFITVJKPLZTUQYBZ PLCHSOYXJPRZUPTFLASSKPTWS


UIKLOPKZVBGFEQAUBV FZGLCADIBNCSPUGEO
SHAFIQ

Question # 3: Complete table 2 with the help of “Polyalphabetic Ciphers”? CLO_2

Fill table1 for M1, M2, and M3, (a) M1 starts with your first name, (b) M2 with your last name and, (c)
M3 should start with your full name

Table 1:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

M1 S A M R A

M2 S H A F I Q

M3 S A M R A H S H A F I Q

4
Table 2:

PLAIN TEXT CIPHER TEXT

NEWZEALANDCAPTAINWONTHETOSSANDELE
CTEDTOBAT

VSZWSVLUCTMBWSVQQDGOHXNFGVN

You might also like