Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Module Code & Module Title

CC5004NI Security in Computing

Assessment Weightage & Type


10% Weekly Assignment

Year and Semester


2021-22 autumn / 2021-22 spring

Student Name: Nischita Paudel


London Met ID: 20049186
College ID: NP01NT4S210092
Assignment Due Date: 26th November
Assignment Submission Date: 26th November

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Tutorial 04 – Security in Computing (Cryptography – Part II)
Question 01. Describe the 4 rules which must be followed in order to encrypt a text
using a Playfair Cipher.
ANS: The four rules that must be followed to encrypt a text using a Playfair cipher is:
Firstly, if the key is Rosey then, a table using Playfair cipher would be:

R O S E Y
A B C D F
G H I/J K L
M N P Q T
U V W X Z
Table 1 5*5 Playfair text

RULE 1: When the letters are in a pair, the repeated letters in the pair are separated
using a filler letter “X, Y, Z”.
For instance: HELLOW as the plain text to be encrypted.
Here the letters are separated into pairs.
HE LL OW
As LL are repeating letters, filler letter X is used to separate them. So, the ciphered text
would be
HE LX O W

Rule 2: Plain text letters in the same row are replaced by the letters to the right.
For example: As RS letters are in the same line, we need to shift the letters to the right
side from the letters.

R O S E Y
A B C D F
G H I/J K L
M N P Q T
U V W X Z
Table 2 Rule 2 Playfair text

Hence, the letter RS would be OE by the rule.

Rule 3: Plain text letters in the same column then they are replaced by the letters down
from it.
For example: Suppose “YL” letters are in the same line, we need to shift the letters one
time down from the letters.
R O S E Y
A B C D F
G H I/J K L
M N P Q T
U V W X Z
Table 3 Rule 3 Playfair text
Hence, “YL” would be FT by the rule.

Rule 4: Plain text letters in pair in the 5x5 matrix are replaced by the letters intersecting
the pairs. For example: As SF letter does not match any above rules then we need to
find the intersection of the letters in pair.
R O S E Y
A B C D F
G H I/J K L
M N P Q T
U V W X Z
Table 4 Rule 5 Playfair text

Hence, the letters SF intersect with YC so the letter would be YC respectively.

Question 02. Encrypt the Plaintext “SECURITY” using the key “COMPUTING”, by using
the Playfair Cipher.
ANS: Firstly, plaintext is divides into word like
SE CU RI TY then,
Using key COMPUTING

C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z
Table 5 Playfair Cipher

So, Now
SE = QH
CU=OC, AS they are on the same row that is vertical so, taking value of their right side.
RI= LG
TY=GV
Taking SE as explanation.

C O M P U
T I/J N G A
B D E F H
K L Q R S
V W X Y Z
Table 6 Example of Playfair Cipher

IN SE first we need to look where is S and E and as they are on the diagonal As, S is
diagonal to E and its lower value is Q and E is diagonal to S and its upper value is H
which is in the same row. Similarly, in R and I and they are in the rectangle shape and
the point intersecting them is L and G respectively.
So, SE became HQ.
Question 03. Why are Transposition Ciphers considered to be weak?
ANS: As they don't modify the letters in the plaintext or hide patterns, transposition
ciphers aren't very safe, but they may be used to create more secure encryption
techniques. The rail fence cipher is an example of a transposition cipher. Without any
system, the letters may be easily jumbled.

Question 04. Encipher (encrypt) the message “SECURITY IN COMPUTING” using the
Rail Fence Cipher.
ANS:
S C R T I C M U I G
E U I Y N O P T N
Table 7 Rail Fence Cipher

Question 05. Elaborate how Row Transposition Ciphers can be used to maintain the
confidentiality of an unencrypted message.
ANS: Transposition of rows Ciphers may be used to protect secrecy by making a
rectangle and serially writing each plain text with hard key value letters. Key numbers
will be put in ascending order after their key letters.
For an instance:
Plain text: CLARK
Key: phase (4 3 1 5 2)

KEY 4 3 1 5 2

PLAIN C L A R K
TEXT
V W X Y Z

Table 8 row transposition

Thus, the ciphered text is: AX KZ LW CV RY.


There letter are ciphered is such a way that no one can easily identify and is more safe
which helps in maintaining confidentiality.

Question 06. What factor of the Product Cipher results in the resulting cipher text to
become more secure?
ANS: The factor of the product Cipher that results in the resulting cipher text to become
more secure are:
1. Substitution
2. Transposition
3. SDES (Simplified Data Encryption Standard)
4. DES (Data Encryption Standard)
5. Mixer function

You might also like