MSIS Exam SSI809 2015 16 Solution

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Name:Matric.

No: Signature:

University of Lagos
School of Post Graduate Studies
Department of Psychology
In Collaboration with
Institute of Security, Nigeria
Master of Security & Intelligence Studies (MSIS), 2015/2016 Academic Session
SSI809: Intelligence, Surveillance & Electronic Security

Section C
Question 5
(a) Ile-Owo Bank Plc. is a registered commercial bank in the country. The policy of the bank is to be using a wellknown product cipher whenever it wants to send confidential messages to its numerous customers nationwide;
knowing fully well that, the communication channel is not secured. To implement the policy, the bank acquired
encrypted and decrypted application package (e&dAPP) that is based on the cipher. The e&dAPP is supported by
both mobile phones and computer systems.
Mr. Ise-kolowo, an artisan has just registered with the bank, and the ICT department of the bank helped him to
install the e&dAPP on his mobile phone. The department also instructed him to be using ILEOW58 and BANKMI
as the keywords for the ADFGVX and ROUTE keys respectively for the e&dAPP on his mobile phone for the
decryption of any encrypted message he receives from Ile-Owo Bank Plc.
(i)

Mr. Ise-kolowo received a message which reads; AAAG?VXX?AX?FG?AXX from the bank;
incidentally, the e&dAPP did not work. He contacted you to help him out because it was on Saturday and
knowing fully well that you are a certified Information Security Expert. Analyze the encrypted message
and tell Mr. Ise-kolowo what the message is all about. Note: ? stands for a space
In your own opinion, what do you think the bank is trying to achieve with the implementation of the
policy?

(ii)

(b) The security report at the disposal of the Chief Security Officer (CSO) of Otunba Sunday Adetona University of
Technology (OSAUTech) reveals that some suspected group do assemble in room 255 of the Department of Power
Engineering of the university at 2200hours every Thursday; to plan their notorious activities. The members of the
group pretend as if they are doing tutorials. You are commissioned by the CSO of the university to use a modern
bugging device, ZEN Bug; to establish what is actually going on in the group anytime the members are meeting in
the said room. How would you program and use the device to achieve your aim?
Solution
(a) Decryption using the ROUTE key
ROUTE Cipher Keyword: BANKMI
Received Cipher text: AAAG?VXX?AX?FG?AXX
No of letters in the keyword: 6
(1 mark)
No of letters in the Cipher text: 18
(1 mark)
No of letters that forms letters of each word of received cipher text = No of letters in the Cipher tex/ No of letters in
the keyword
= 18/6 = 3
(2 marks)
Therefore,
AAA G?V XX? AX? FG? AXX
1
2
3
4
5
6
Development of ROUTE key
B

(2 marks)
(2 marks)

SSI804@19_11_2016_1400hrs

Page 1 of 2

Name:Matric. No: Signature:

2
G
?
V

1
A
A
A

6
A
X
X

4
A
X
?

5
F
G
?

3
X
X
?

The intermediate cipher text is GAAAFX?AXXGXVAX???

(4 marks)
(2 marks)

Development of ADFGVX key


To decrypt intermediate cipher text, we need ADFGVX key
The key is developed viz
A
D
F
G
V
X

A
I
8
G
P
V
2

D
L
A
H
Q
X
3

F
E
B
J
R
Y
4

G
O
C
K
S
Z
6

V
W
D
M
T
0
7

X
5
F
N
U
1
9
(4 marks)

The plaintext is obtained from intermediate ciphertext viz:


Intermediate cipher text: GA AA FX AX XG XV AX
Plaintext:
P I N
5 6 7 5

(4 marks)

The message is PIN 5675


(i) The policy of the bank is gearing towards enforcing some possible goals of information security like:
Privacy/confidentiality - information not disclosed to unauthorized entities
Integrity - information not altered deliberately or accidentally
Authentication - validation of identity of source of information
Non-repudiation Sender should not be able to deny sending a message
(5 marks)
(b)

Programming of the device

Insert a registered SIM card in the device;


Placed the rechargeable battery of the device in its location;
Charge the device
Put on the device
Send SMS to the SIM card number in the unit, the unit will know you are the master.

Usage of the device:

Before 2200hours on Thursday place the bug anywhere in room 255, make sure it is fully charged, and on
silence
At exactly 2200hours on Thursday, call the line inserted in the Zen bug
Listen and record the groups discussions
Analyze the recorded discussions
Present your findings to the CSO.
(5 marks)

SSI804@19_11_2016_1400hrs

Page 2 of 2

You might also like