Professional Documents
Culture Documents
Program: BSIT-7A
Enrolment: 02-235192-014
BAHRIA UNIVERSITY
Karachi Campus
Department of Computer Science
Marks: 05
Submission Instructions:
• Please ensure that your name, your student ID number, Course teacher information,
Class, Semester ,University information are legibly written and clearly visible on the
front of your submission.(Please follow the title page template)
• Late submission under any circumstances is not allowed.
Assignment Tasks:
• Interception.
• Traffic analysis.
• All passive attacks.
cryptographic algorithms and how to either break or improve them. They can be attackers
when trying to figure out the algorithm and decrypt the ciphertext, and can be
intelligence agents when creating a report for the cryptographers to show them where
their algorithm is lacking and how to make it more secure against possible decryption
attempts.
8. Apply Ceasar Shift cipher technique, By using the given key shift the
letters of the provided message: