Professional Documents
Culture Documents
MSIS Exam SSI809 2015 16 Solution
MSIS Exam SSI809 2015 16 Solution
MSIS Exam SSI809 2015 16 Solution
No: Signature:
University of Lagos
School of Post Graduate Studies
Department of Psychology
In Collaboration with
Institute of Security, Nigeria
Master of Security & Intelligence Studies (MSIS), 2015/2016 Academic Session
SSI809: Intelligence, Surveillance & Electronic Security
Section C
Question 5
(a) Ile-Owo Bank Plc. is a registered commercial bank in the country. The policy of the bank is to be using a wellknown product cipher whenever it wants to send confidential messages to its numerous customers nationwide;
knowing fully well that, the communication channel is not secured. To implement the policy, the bank acquired
encrypted and decrypted application package (e&dAPP) that is based on the cipher. The e&dAPP is supported by
both mobile phones and computer systems.
Mr. Ise-kolowo, an artisan has just registered with the bank, and the ICT department of the bank helped him to
install the e&dAPP on his mobile phone. The department also instructed him to be using ILEOW58 and BANKMI
as the keywords for the ADFGVX and ROUTE keys respectively for the e&dAPP on his mobile phone for the
decryption of any encrypted message he receives from Ile-Owo Bank Plc.
(i)
Mr. Ise-kolowo received a message which reads; AAAG?VXX?AX?FG?AXX from the bank;
incidentally, the e&dAPP did not work. He contacted you to help him out because it was on Saturday and
knowing fully well that you are a certified Information Security Expert. Analyze the encrypted message
and tell Mr. Ise-kolowo what the message is all about. Note: ? stands for a space
In your own opinion, what do you think the bank is trying to achieve with the implementation of the
policy?
(ii)
(b) The security report at the disposal of the Chief Security Officer (CSO) of Otunba Sunday Adetona University of
Technology (OSAUTech) reveals that some suspected group do assemble in room 255 of the Department of Power
Engineering of the university at 2200hours every Thursday; to plan their notorious activities. The members of the
group pretend as if they are doing tutorials. You are commissioned by the CSO of the university to use a modern
bugging device, ZEN Bug; to establish what is actually going on in the group anytime the members are meeting in
the said room. How would you program and use the device to achieve your aim?
Solution
(a) Decryption using the ROUTE key
ROUTE Cipher Keyword: BANKMI
Received Cipher text: AAAG?VXX?AX?FG?AXX
No of letters in the keyword: 6
(1 mark)
No of letters in the Cipher text: 18
(1 mark)
No of letters that forms letters of each word of received cipher text = No of letters in the Cipher tex/ No of letters in
the keyword
= 18/6 = 3
(2 marks)
Therefore,
AAA G?V XX? AX? FG? AXX
1
2
3
4
5
6
Development of ROUTE key
B
(2 marks)
(2 marks)
SSI804@19_11_2016_1400hrs
Page 1 of 2
2
G
?
V
1
A
A
A
6
A
X
X
4
A
X
?
5
F
G
?
3
X
X
?
(4 marks)
(2 marks)
A
I
8
G
P
V
2
D
L
A
H
Q
X
3
F
E
B
J
R
Y
4
G
O
C
K
S
Z
6
V
W
D
M
T
0
7
X
5
F
N
U
1
9
(4 marks)
(4 marks)
Before 2200hours on Thursday place the bug anywhere in room 255, make sure it is fully charged, and on
silence
At exactly 2200hours on Thursday, call the line inserted in the Zen bug
Listen and record the groups discussions
Analyze the recorded discussions
Present your findings to the CSO.
(5 marks)
SSI804@19_11_2016_1400hrs
Page 2 of 2