0% found this document useful (0 votes)
24 views2 pages

Cat 1

Uploaded by

barasaian878
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views2 pages

Cat 1

Uploaded by

barasaian878
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CHUKA UNIVERSITY

COSC 464:CRYPTOGRAPHY AND COMPUTER SECURITY

Assignment/CAT1
Task1:

Given Key: 1 3 4 7 5 6 2, using Rail fence cipher to encrypt the message “The Grenade is ready”

Task 2:

Use the expression E(x) =(8x +3) MOD 26 to encrypt the message “The attack is over"

Task 3:

Using RSA,show how two users can encrypt a message M givenp=3;q=5,e=3;M=HI

(i)Determine the value of n

(ii)Determine f(n)

(iii)Determine Public Key

(iv)Determine Private Key

(v)Encrypt“M”

Task 4:
Using Diffie-Hellman and given p=7and g=3
i.Choose a secret key for both Alice and Bob
ii.Compute public key for both Alice and Bob
iii.Compute the common session key to be used by both alice and Bob to encrypt messages

Task 5: (Computer Science students only)

You are currently working on a fourth year project where you are required to do Security Design as a
component of system design. Use your fourth year project to do the following:
(a)With justifications, identify the security controls you will incorporate in your project design. Give your
justifications/rationale based on the need to achieve the following security objectives.

i.Confidentiality of system captured or generated data


ii.Integrity of system captured or generated data

iii.Availability of the system when legitimate users need to use it.

You might also like