Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
121 views16 pages

Itt320 - Introduction To Computer Security: Lab 3 Cryptography

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 16

ITT320 - INTRODUCTION TO COMPUTER SECURITY

____________________________________________________________

LAB 3
CRYPTOGRAPHY

PREPARED BY:
NUR AZIMIN BINTI ZA’BA

STUDENT NUMBER:
2018692902

GROUP:
KCS3205H

LECTURER’S NAME:
DR MAZURA BINTI MAT DIN
Task 1
Determine and provide a histogram showing in the graphical form the relative frequency of
letters in all three prepared long texts, as well, as the textual listings of 26 most frequent
diagrams and trigrams.
Do the frequency distributions depend significantly on the type of text in English? Justify.
Task 2
Take a small subset of the data prepared in initial work 1, e.g., the first 200 letters, and
recomputed all frequency distributions.
Determine how good is the match between frequency distributions for short texts and long texts
(ie the data file) of the same type. Summarize your observations.
Task 3
Encrypt a single long and a single short English text taken from data, prepared in
Initial work and Task 2 using the following four classical ciphers available in CrypTool:
Caesar, Subsitution, Vigenere, and Permutation. Compute the frequency distribution of single
letters, diagrams, and trigrams for all 8 obtained ciphertexts.
What are the characteristic features of the obtained distributions?
How you could use them to determine which cipher was used to obtain the given ciphertext?

Single Long
Caesar

Substitution
Vigenere

Permutation
Single Short
Caesar

Substitution
Vigenere

Permutation
Task 4
Below are six ciphertexts of the same message encrypted using the following four classical
ciphers available in CrypTool: Caesar (shift), Substitution, Vigenere and Permutation.
Do your best to match ciphertexts with a cipher that could have been used to obtain the given
ciphertext. If you are uncertain, you can list several ciphers per each ciphertext. Justify your
answer.
Find the plaintext, by breaking the Caesar (shift) cipher, and then find the keys for at least 3
ciphers used to encrypt the now known plaintext.
All attacks must be documented. Brute-force attacks do not count.

Ciphertext 2
GSVGXK JOYOYMOJ LB NBJEOLLRO LRCTEK LRGL YGHO XBP KGHMPL TOQOJ
NBJEOL LB JOYOYMOJ LRO LRCTEK LRGL YGHO XBP ESGHGSVGXK
JOYOYMOJ
LB NBJEOLLRO NJCOTHK LRGL FJBQOH PTLJPOMPL HB TBLNBJEOL LB
JOYOYMOJLRBKO LRGL RGQO KLPUA MX XBPGSVGXK JOYOYMOJ LB NBJEOL
LRO LJBPMSOK LRGL RGQO FGKKOH GVGXMPL TOQOJ NBJEOL LB JOYOYMOJ
LRO MSOKKCTEK LRGL UBYO OGUR HGX
Plaintext
KEY = GMUHONERCDASYTBFIJKLPQVWXZ
Plaintext
Ciphertext 3
DOZDBVUHPHPEHU WR IRUJHWWKH WKLQJV WKDW PDGH BRX VDGEXW
QHYHU
IRUJHW WR UHPHPEHUWKH WKLQJV WKDW PDGH BRX JODG DOZDBV
UHPHPEHU
WR IRUJHWWKH IULHQGV WKDW SURYHG XQWUXHEXW GR QRW IRUJHW WR
UHPHPEHUWKRVH WKDW KDYH VWXFN EB BRXDOZDBV UHPHPEHU WR
IRUJHW
WKH WURXEOHV WKDW KDYH SDVVHG DZDBEXW QHYHU IRUJHW WR
UHPHPEHU
WKH EOHVVLQJV WKDW FRPH HDFK GDB
Plaintext

Ciphertext 4
AMESOV OHALEOIR EO ETUWETSAU GBSOWE THSR ETMD EGN VUGBAK
YTEHS
NTRNEA RH AAFMHAAMEDE TEETBS OTAE ETTG EEG GYETTHGRFR
PUFMETLB TE
PBRMSCYMR NENTRTU SOFT RTESSA MELEYOEET AL BTT UERETA MR
EOBRMHCARHTST EEIM SOTM BRMNE WE TTUOTTAYE OOHAERET CR
FHAUGBGYA
RHHNNOHV OMRU AWRE BHHYTE TDOEIDL BTSDD TRHYRF RT
DVOHSAEOIDT
EESOYTEAT OROE UEGB VAFM LAD

Encryption

1 3 4 10 9 2 6 7 5 8
A W A E M L S R Y E
M E R G R B O F T O
E T H G N T T H E I
S H A Y E T M A T D
O S A E N U B U D T
V R F T T E R G O E
O E M T R R M B E E
H T H H T E N G I S
A M A G U T E Y D O
L D A R S A W A L Y
E E M F O M E R B T
O G E R F R T H T E
I N D P T E T H S A
R V E U R O U N D T
E U T F T B O N D O
O G E M E R T O T R
E B E E S M T H R O
T A T T S H A V H E
U K B L A C Y O Y U
W Y S B M A E M R E
E T O T E R O R F G
T H T E L H O U R B
S E A P E T H A T V
A S E B Y S A W D A
U N E R O T E R V F
G T T M E E R E O M
B R T S E E E B H L
S N G C T I T H S A
O E E Y A M C H A D

Decryption

1 2 3 4 5 6 7 8 9 10
A L W A Y S R E M E
M B E R T O F O R G
E T T H E T H I N G
S T H A T M A D E Y
O U S A D B U T N E
V E R F O R G E T T
O R E M E M B E R T
H E T H I N G S T H
A T M A D E Y O U G
L A D A L W A Y S R
E M E M B E R T O F
O R G E T T H E F R
I E N D S T H A T P
R O V E D U N T R U
E B U T D O N O T F
O R G E T T O R E M
E M B E R T H O S E
T H A T H A V E S T
U C K B Y Y O U A L
W A Y S R E M E M B
E R T O F O R G E T
T H H T R O U B L E
S T E A T H A V E P
A S S E D A W A Y B
U T N E V E R F O R
G E T T O R E M E M
B E R T H E B L E S
S I N G S T H A T C
O M E E A C H D A Y

Ciphertext 5
This ciphertext use Vigenere which is a polyalphabetic substitution.
The keyword is ACADEMIA, A(0) C(2) A(0) D(3) M(12) I(8) A(0)

Ciphertext Operation(SHIFT) answer Alphabet

A 0 – 0 (A) 0 A
N 13 – 2 (C) 11 L
W 22 – 0 (A) 22 W
D 3 – 3 (D) 0 A
C 2 – 4 (E) 24 Y
E 4 – 12 (M) 18 S
Z 25 – 8 (I) 17 R
E 4 – 0 (A) 4 E
M 12 - 0 12 M
G 6-2 4 E
M 12 - 0 12 M
E 4-3 1 B
I 8-4 4 E
D 3 - 12 17 R
B 1-8 19 T
O 14 - 0 14 O

You might also like