IT0005-Laboratory-Exercise-4 - Exploring Encryption Methods
IT0005-Laboratory-Exercise-4 - Exploring Encryption Methods
IT0005L
(Information Assurance & Security 1)
EXERCISE
8
Exploring Encryption Methods
Student Name /
Group Name: Vic Jayson Dela
Rosa
Name Role
Members (if Group):
Section: TX32
Professor: Mr. Calimbo
I. PROGRAM OUTCOME/S (PO) ADDRESSED BY THE LABORATORY EXERCISE
• Analyze a complex problem and identify and define the computing requirements appropriate to its
solution. [PO: B]
Step 4: Decrypt the message using the keyword and Vigenère square.
a. Use the table below to help you decrypt the message. Start by entering the letters of the
encrypted message in the second row of cells, from left to right.
Cip
her T C P I P T C P I P T
Keywor
d
Encryp G G I A T V W G Q I R
ted
Messag
e
Decryp N E T S E C U R I T Y
ted
Messag
e
Cipher
Keyword
Encrypte
d
Message
Decrypte
d
Message
Cipher
Keyword
Encrypte
d
Message
Decrypte
d
Message
Briefly answer the questions below. Avoid erasures. For group activity, specify the
name of GROUP MEMBER/s who answered the question. Do not forget to include
the source for all NON-ORIGINAL IDEAS.
• Could the Vigenère cipher be used to decode messages in the field without a
computer?
Yes. The recipient need only have a copy of the encrypted message, the
cipher keyword, and a copy of the Vigenère square.
Search the Internet for Vigenère cipher cracking tools. Is the Vigenère cipher
• considered a strong encryption system that is difficult to crack?
VIII. REFERENCES
• https://www.cs.utexas.edu/~byoung/cs361c/slides1-intro.pdf
• Herrmann, Debra S. (2001). A Practical Guide to Security Engineering and
Information Assurance. Auerbach Publications.