0% found this document useful (0 votes)
40 views3 pages

Tutorial Sheet 1

The document contains a series of exercises focused on security and cryptosystems, specifically encryption and decryption techniques using various ciphers such as Caesar, Substitution, and Vigenere. It includes tasks for encrypting plaintext messages, recovering plaintext from ciphertext, and analyzing the advantages of different cipher methods. Additionally, it addresses the decryption of given ciphertexts and the application of frequency analysis in cryptanalysis.

Uploaded by

agbornjabesong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

Tutorial Sheet 1

The document contains a series of exercises focused on security and cryptosystems, specifically encryption and decryption techniques using various ciphers such as Caesar, Substitution, and Vigenere. It includes tasks for encrypting plaintext messages, recovering plaintext from ciphertext, and analyzing the advantages of different cipher methods. Additionally, it addresses the decryption of given ciphertexts and the application of frequency analysis in cryptanalysis.

Uploaded by

agbornjabesong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CEF350 - Security and Cryptosystems

Exercise Sheet
Exercise 1

Assume the following plaintext messages: M1 = Happy Easter you all; M2 = You can view
your invoice using the following link, and let us know if you have any questions; M3 = Good
afternoon, This is a reminder of your upcoming job interview with us. Please reply YES to
confirm your attendance. Thank you.

1. Encrypt M2 and M3 using Caesar cipher with key 6 and 4 respectively.

2. Encrypt M1 and M2 using the Substitution cipher with key 5.

3. Encrypt M3 using Vigenere cipher with key K = offer.

Exercise 2

1. Given that the Caesar’s cipher is used, recover the plaintext that corresponds to the
following ciphertext: Sodlqwhaw wr eh hqfubswhg. Describe your approach to
cryptanalysis of the ciphertext.

2. Assume that we choose M (that is, K=13) as an encryption key in Caesar’s cipher.
What is the result (Ci) of the following (double) encryption Ci = E(K, E(K, Mi)) ;
where Mi is an arbitrary plaintext element?

3. How many encryptions with key K=2 is needed before observing the same effect as in
the previous question (with K=13)?

Exercise 3

We consider a Caesar cipher and assume that the plaintext message is in English. Decrypt the
following ciphertext by giving a brief explanation:

KNXMNSLKWJXMBFY JWGJSIXFIRNY XB
TWIKNXMWFSITAJWMJQRNSLFSDIFD

We consider a ciphertext-only attack on a substitution cipher and assume that the plaintext
message is in English. Decrypt the following ciphertexts by giving a brief explanation:

XTHQTXJSTRFY Y JWMTBKFW
ynyqj

Note: Use the following frequency distribution of the letters in the English language in the
table below for the analysis:

1
Exercise 4

1. Encrypt the message below using the following methods. Assume the English
alphabet.

Supplieswillarrivetonight

a) Vigenere with key K = order.


b) Columnar Transposition with key K = (5, f) where f is the following permutation:

i: 1 2 3 4 5
f(i): 4 1 2 5 3

c) Periodic permutation with key K = (4, f) where f is

i: 1 2 3 4
f(i): 4 1 2 3

2. What is the main advantage of Vigenere cipher over Caesar cipher?

Exercise 5

A Vigenere type of cipher is given as follows:

Plaintext space X = { 0, … , 25 }.
Ciphertext space Y = { 0, … , 25 }.
Key space K = { 0, … , 25 }.
Encryption function is defined by: E(X; K) = (X + K) mod n

The following alphabet X = { A, B, … , Z } is identified with the natural numbers.


1. Determine the decryption function.
2. Encrypt the text below by using the key ”hello” and assuming (as usual) that n = 26.

Write your answer with a block of length 5 and ignore spaces, dots and commas. (Show your
steps briefly!)

Mr President; I am delighted to accept your offer.

2
Exercise 6

Given is the following string of ciphertext which was encrypted with substitution cipher:

asvphgyt

The encryption rule is given as C = (M + K) mod 26, where C is the ciphertext, M is the
plaintext and K is the key. We assume that the plaintext is in English.

Assume that the first plaintext letter is a W. Find the key and decrypt the message.

You might also like