CP3404 Information Security Assignment

Assignment Help Computer Engineering
Reference no: EM132605606

CP3404 Information Security - James Cook University

Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically).

1. Using the web, find out who Kevin Mitnick was. What did he do?
Who caught him?
Write a short summary of his activities and why he is famous.

2. One-Time Pad (OTP) - An unbreakable cryptographic system
Use the Internet to search OTPs; who was behind the initial idea, when they were first used, in what application they were found, how they are used today, etc. Then visit an online OTP creation site such as www.braingle.com/brainteasers/codes/onetimepad.php and practice creating your own ciphertext with OTP. Exchange your OTPs with other students to see how you might try to break them. Would it be practical to use OTPs? Why or why not? Write a short summary on your findings.

3. Cryptanalysis of Substitution Ciphers:
In this question you learn a classical monoalphabetic (substitution) cryptographic system, and are required to cryptanalysis a given cryptogram.
In substitution ciphers, a permutation of the alphabet is chosen as the cryptogram of original alphabet. That is, every letter of the plaintext substitutes by corresponding letter in the permuted alphabet. For example,

a b c d e f g h i j k l m n o p q r s t u v w x y z c

o d k s z r g e l u y a f m v p h i n w t b j q x

Figure 1: A possible permutation of English alphabet

is one of such permutation, in which letters a, b, c, , y, z from the plaintext are substituted by corresponding letters c, o, d, , q, x respectively. Since remembering permutation is not easy, one may employ a keyword and use a table to generate the permuted alphabet. Let CRYPTOGRAPHY be the keyword. The permuted alphabet can be obtained as follows.
• Choose a 6 × 5 table/matrix, i.e., a table with 6 rows and 5 columns.
Write down the secret keyword in cells (1, 1), (1, 2), , one letter in each cell, but skip repeated letters. Figure 2 shows how ‘CRYPTOGRAPHY' (as a keyword) written down in the table.
Write alphabet letters (in order) from the first available cell after keyword, but skip all letters that are already written in the table. You will come out with Table 3.
The permuted alphabet, which will be used to generate the cryptogram, can be obtained by simply reading the content of Table 3 in columns order (see Figure 1).

C

R

Y

P

T

O

G

A

H

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Figure 2: CRYPTOGRAPHY is the Keyword

Your Task:

Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services.
A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding cipher- text within an appropriate time frame.
In this question, you are required to determine the plaintext and the keyword associated to the given cryptogram. Note that brute force attack (i.e., searching all possible keys) in order

C

R

Y

P

T

O

G

A

H

B

D

E

F

I

J

K

L

M

N

Q

S

U

V

W

X

Z

 

 

 

 

Figure 3: Table for permuting alphabet

1010_figure.jpg

Figure 4: Letter frequency in English texts

to find the keyword is not efficient. However, letter frequency (see Figure 4) attack is an efficient tool for breaking substitution ciphers.
In the following you can find 10 cryptograms, where the breaks are genuine breaks between English words. You are required to decipher the cryptogram that matches with your Student- ID.

Attachment:- Information Security.rar

Reference no: EM132605606

Questions Cloud

Return for stock from the monthly return for the market : The beta of a stock is defi ned as the slope of the least-squares line used to predict the monthly return for a stock from the monthly return for the market.
List two key principles of statistical analysis : List two (2) key principles of statistical analysis. Describe the application of each principle in Financial data analysis and Operational budgets
Describe how the functional organization structure : Describe how the functional organization structure, management controls, and compensation policies are used to implement vertical integration.
Determine the adjusted balances of Accounts Receivable : Analysis of Receivables Method - Determine the adjusted balances of Accounts Receivable, Allowance for Doubtful Accounts, and Bad Debt Expense
CP3404 Information Security Assignment : CP3404 Information Security Assignment Help and Solution, James Cook University - Assessment Writing Service - Write a short summary of his activities
Explain the distract management team : Distract management team and induce overly-conservative decisions. Explain which of the above arguments you are more in agreement with.
Describe 11 bases of product differentiation : Define product differentiation, describe 11 bases of product differentiation, and how these bases of product differentiation can be grouped into three
Assess value of adaptive behavior in addressing change : Assess the value of adaptive behavior in addressing change and meeting organizational goals.
How much is the cost of the inventories purchased : How much is the cost of the inventories purchased? Non-refundable purchase tax, not included in the purchase price above, P5,000

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify information needs in various community settings

Community Information Services-Level-Semester 2, Year 1-National Council for Higher Education- BACHELOR OF LIBRARY AND INFORMATION SCIENCE.

  Implementing the nested – loop join algorithm

Implement the Nested – Loop Join algorithm in any of the programming language.The solution should involve:a) Source file of application,

  Draw the output waveform

Apply the input waveforms below to the following circuit and draw the output waveform (Q).

  What technologies need to be described

Environmental Section sUAS: Topic and Description Use at least two sentences per line item. Technology: What technologies need to be described?

  What is probability that it contains exactly k white balls

An urn contains m white and n black balls. If a random sample of size r is chosen, what is the probability that it contains exactly k white balls?

  Discuss whether there are too many standards organizations

Discuss whether there are too many standards organizations attempting to regulate the networking field

  What is the rationale for refactoring in agile development

You identified dirty code when working on separate task (While working on a task you have identified some dirty code from some other task.

  What is maximum depth of recursion in function solve-from

What is the maximum depth of recursion in the function solve_from? Construct the recursion tree of all situations that the function solve_from will consider.

  Write a recursive version for function int factorial

Write a recursive version for function int factorial(int n) which returns n!. You should know how to write recursive version for function int sum(int n).

  Credit scorecards are used by banks and financial

credit scorecards are used by banks and financial institutions to determine whether applicants will receive loans. the

  Define absolute and comparative advantage

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments.

  Which language would be more appropriate

The vehicle registration department for the State of Florida is becoming decentralized. Each county would now handle its own registration process and will issue its own license plates

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd