Professional Documents
Culture Documents
T318 Spring 2019 MTA Sol
T318 Spring 2019 MTA Sol
MTA ---SOLUTION
Instructions:
1
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Part 1: This part carries 6 marks of the total MTA marks. You should attempt all
questions. Select the most appropriate choice. 1 mark for each one.
1. ____B______ involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.
A) Disruption B) Replay
C) reliability D) integrity
3. A(n) _____A_____ is a potential for violation of security, which exists when there is a
circumstance, capability, action or event that could breach security and cause harm.
A) threat B) attack
4. Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of
the data unit to prove the source and integrity of the data unit and protect against forgery is
a(n) ____B_______.
A) security audit trail B) digital signature
C) encipherment D) authentication exchange
5. A _____A_____ attack involves trying every possible key until an intelligible translation of
the ciphertext is obtained.
A) brute-force B) Caesar attack
2
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Part 2: Classical Encryption Techniques (24 marks)
Exercise 1 [6 marks]
Answer the following questions:
a) Alice would like to send a message to Bob by using asymmetric cryptography. She wants
to ensure that only Bob can decrypt the message. What key should he use for the
decryption? (2 marks)
b) Christopher received a message from Richard that contains a digital signature. When
Christopher wants to verify the digital signature, what key should he use to decrypt it? (2
marks)
c) What are the differences between CCM and GCM operation mode? (2 marks)
CCM and GCM ensure data confidentiality in addition to data integrity and source
authentication. The difference is the step of data integrity and source authentication.
CCM uses CMAC , while GCM uses GMAC.
Exercise 2 [6 marks]
We are using the affine cipher: 5x + 7 mod 26 to encrypt a plaintext “DOIT”. Find the ciphertext. (Don’t
forget: Letter ‘A’ = 0, ‘B’ = 1, …, ‘Z’ = 25)
Plaintext: WZVY
Exercise 3 [6 marks]
Decrypt “XURJ” using the Hill cipher with the key: [3211] .
3
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Plaintext: DOIT
Exercise 4: [6 marks]
We are using the Vigenere cipher with the key “SECRET”. Note that the Vigenere Tableau is attached to
the exam.
Exercise 5: [6 marks]
Encrypt the message “SEARCHHIM” using the Playfair cipher with the key “NEWTON”.
Ciphertext: PODMBIIKQU
o The plaintext T is = [7 7 7 7 7 7 7 7]
a) Mix (XOR) the message T with the listed round key (RK) (1 marks)
4
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
T XOR RK=[ 0 6 2 4 1 5 3 7]
b) Then, permute the mixed message by using the listed permutation table (P-box).
Permutation operation works with index that start from 1. (2 marks)
[5 2 1 4 7 3 6 0]
c) Then, substitute the permuted message by using the listed substitution table. Note that
the substitution operation works with value that starts from 0. (2 marks)
[4 6 1 0 2 7 5 3]
d) Calculate the inverse round key? Explain how you obtain it? (2 marks)
Inv_Pbox = [8 7 2 4 3 1 6 5]
f) Calculate the inverse substitution table? (S-1[S[i]] =i) (1 marks)
Inv_Sbox =[ 4 1 7 0 5 6 2 3]
The plaintext T is = [7 7 7 7 0 0 0 0]
5
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Now, writing out the following steps:
a) Permute the message T by using the first permuted table P-box1 to obtain the first
permutation ciphertext C1. Then, permute the message T by using the second
permutation table P-box2 to obtain the second permuted ciphertext C2. After this,
calculate the difference percentage at the bit level between CP1 and CP2. And what is
your conclusion? (2 marks)
C1 =[ 0 0 7 7 7 7 0 0]
C2 =[ 7 0 0 0 7 7 0 7]
Difference = 50% AE is reached
b) Substitute the message T by using the first substitution table S-box1 to obtain the first
substituted ciphertext CS1. Then, substitute the message T by using the second
substitution table S-box2 to obtain the second substitution ciphertext CS2. After this,
calculate the difference percentage at the bit level between CS1 and CS2. And what is
your conclusion? (3 marks)
CS1 =[ 7 7 7 7 5 5 5 5]
CS2 =[ 6 6 6 6 3 3 3 3]
Difference =50% AE is reached
c) Calculate the difference at the element level between S-box1 and S-box2? And what
is your conclusion? (3 marks)
6
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
The plaintext T1 is = [0 0 0 0 1 0 0 0]
Function F:
Function G:
According to these results, function F cannot be considered as a secure Keyed compression function
(plaintext and key sensitivity are not ensured).
7
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Independence Plaintext-Sensitivity Key-Sensitivity Plaintext and key
Dif(T0, G_T0_K)= 6 Diff(G_T0_K, G_T1_K) = 7 Diff (G_T0_K, G_T0_KK) = 4 sensitivity
DifT0, G_T0_KK)= 4 Diff(G_T0_KK, G_T1_KK) Diff (G_T1_K, G_T1_KK) =5 Diff (G_T0_K, G_T1_KK)
Dif (T1, G_T1_K )= 4 =4 =4
Diff(T1, G_T1_KK)= 3 Diff (G_T1_K, G_T0_KK)
=5
Function G ensures plaintext and key sensitivity in addition to the independence, and collision
resistant.
8
This study source was downloaded by 100000805372844 from CourseHero.com on 10-11-2022 07:50:32 GMT -05:00
https://www.coursehero.com/file/57106953/T318-Spring-2019-MTA-Soldocx/
Powered by TCPDF (www.tcpdf.org)