Professional Documents
Culture Documents
KSA T318 MTA FALL 2022 2023 Answer
KSA T318 MTA FALL 2022 2023 Answer
Mid-term
Summer Semester
Date: TBA
Instructions:
Total Marks: 60
Total Number of Questions:
o Part 1: 6
o Part 2: 5
o Part 3: 4
Marks Distribution:
o Part 1: 6 marks
o Part 2: 20 marks
o Part 3: 34 marks
Write your answer in the answer booklets. Answers given on the exam paper will
not be marked.
The use of electronic devices that could have a memory is NOT permitted
Be sure you write your name and ID on the External Answer booklet.
4. We can use Compression techniques to make the encryption more secure and difficult
to attack
A. True
B. False
ANSWER: A
Part 2: Short questions: Answer the following questions – Each question carry a
WEIGHT OF 4 marks. Total: 20 Marks
2. Define the type of security attack in each of the following cases (4 Marks)
a. A student gives a check for $10 to buy a used book. Later she finds that
the check was cashed for $100.
a. This is modification (attack to the integrity of data). The value of the check is
changed (from $10 to $100)
b. A student sends hundreds of e-mails per day to another student using a
phony return e-mail address.
b. This is denial of service (attack to availability). Sending so many e-mails
may
crash the server and the service may be interrupted.
3. Distinguish between a monoalphabetic and a polyalphabetic cipher. (4 Marks)
Substitution ciphers can be divided into two broad categories: mono alphabetic
ciphers and polyalphabetic ciphers.
a. In monoalphabetic substitution, the relationship between a character in the
plaintext and the characters in the ciphertext is one-to-one.
b. In polyalphabetic substitution, the relationship between a character in the
plaintext and the characters in the ciphertext is one-to-many.
4. Distinguish between a substitution cipher and a transposition cipher(4 Marks)
a. In Substitution Cipher Technique plain text characters are replaced with
other characters, numbers and symbols as well as in substitution Cipher
Technique, character’s identity is changed while its position remains
unchanged. .(3 Marks)
b. Transposition Cipher Technique rearranges the position of the plain text’s
characters. In transposition Cipher Technique, The position of the character
is changed but character’s identity is not changed.
5. Distinguish between diffusion and confusion
a. Diffusion complicates the statistics of the ciphertext, and makes it difficult to
discover the key of the encryption process.
b. Confusion makes the use of the key so complex, that even when an attacker
knows the statistics, it is still difficult to deduce the key.
1. Using the Euclidean algorithm, find the greatest common divisor of the following
pairs of integers. (4 Marks)
a. 88 and 220
44
b. 300 and 42
6
c. 24 and 320
8
d. 401 and 700
b. Given the ciphertext and key below, find the plaintext if the Playfair cipher
was used. x is the special character used for padding and i and j are
treated as the same character
C = eiioqoyldc
K = security
what is the plaintext? (5 Marks)
Answer
With K = security the Playfair matrix is:
a. Assuming CBC was used with ABC, decrypt the ciphertext 11110110 using
the key 001 and initialization vector 1110. Explain your calculations in
details. (5 Marks)
Answer. C1 = 1111. Decrypt with key 001 gives 1001. XOR with IV gives
0111. So P1 is 0111. C2 = 0110. Decrypt with key 001 gives 1010. XOR
with C1 gives 0101. So P2 is 0101.
The plaintext is 01110101.