You are on page 1of 3

ASSINGMENT # 01

Submitted by:

Name: AMEENA YAQOOB


Reg. No.: UW-21-CS-BS-040
Class: BSCS 6th A
Subject: Introduction To Information Security
Date: 26th March, 2024

DEPARTMENT OF COMPUTER SCIENCE


UNIVERSITY OF WAH
Question 01:
As we are familiar with the substitution techniques in cryptography, apply the Monoalphabetic
and Playfair ciphers to encrypt your full names.
Monoalphabetic Cipher:
Key: BSCS SIXTH A
Plaint text: AMEENAYAQOOB

 To generate the substitution key we will write the given key first with no repeated alphabet
and then append all remaining alphabets. We have:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

B S C I X T H A D E F G J K L M N O P Q R U V W Y Z

• Replace letters with corresponding words

A M E E N A Y A Q O O B
B J X X K B Y B N L L S
• Encypted version of name:
BJXXKBYBNLLS

Playfair Cipher:
Key: MONARCHY
Plaint text: AMEENA YAQOOB
• Draw 5x5 matrix
• Enter character of keyword into matrix
• Combine I/J in same cell.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
M O N A R

C H Y B D

E F G I/J K

L P Q S T

U V W X Z

• Broke the plain text in pair of two


 If text is of even length break into two.
 If text is of odd length than break into two and put X with last letter.
 If text is of odd length and contains double letter than put X with the first same letter.
• Name has even length so break into two pairs.

AM EE NA YA QO QB

• Now look in the matrix


 If both letters are in same row than replace with alphabet next to it.
 If both letters are in same column than replace with alphabet below to it.
 If they are not in the same row or same column than same row but column of other
alphabet.
• So we have:
AM EE NA YA QO OB
RO FF AR NB PN AH

• Encrypted version of name:


ROFFARNBPNAH

You might also like