0% found this document useful (0 votes)
36 views2 pages

Checkpoint Cryptography & Secure Solution

The document outlines key concepts in cryptography, including definitions of plaintext, ciphertext, encryption, and decryption. It distinguishes between symmetric and asymmetric cryptography, highlighting their differences and common goals such as confidentiality, integrity, and authentication. Additionally, it provides examples of symmetric key encryption using Caesar and Vigenère ciphers, and explains hash functions with an example of MD5.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views2 pages

Checkpoint Cryptography & Secure Solution

The document outlines key concepts in cryptography, including definitions of plaintext, ciphertext, encryption, and decryption. It distinguishes between symmetric and asymmetric cryptography, highlighting their differences and common goals such as confidentiality, integrity, and authentication. Additionally, it provides examples of symmetric key encryption using Caesar and Vigenère ciphers, and explains hash functions with an example of MD5.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Checkpoint Cryptography & Secure solution

Selected Tasks :
• Basic Concept
• Symmetric Key Cryptography
• Cryptographic Algorithms

Solutions
1. Basic Concept
a. Define the terms:

• Plaintext: The original, unencrypted information or message that is readable and


understandable.

• Ciphertext: The encrypted version of plaintext, transformed into an unreadable format.

• Encryption: The process of converting plaintext into ciphertext using an algorithm and key to
secure the information.

• Decryption: The process of converting ciphertext back into plaintext using an algorithm and
key.

b. Difference between symmetric and asymmetric cryptography:

• Symmetric Cryptography: Uses a single key for both encryption and decryption. It is faster but
requires secure key sharing.

• Asymmetric Cryptography: Uses two keys – a public key for encryption and a private key for
decryption. It is slower but more secure, as the private key is never shared.

c. Three common goals of cryptography:

1. Confidentiality: Ensuring that information is only accessible to authorized parties.

2. Integrity: Verifying that the data has not been altered during transmission or storage.

3. Authentication: Confirming the identity of the sender or recipient.

2. Symmetric Key Cryptography


a. Encrypt the plaintext "HELLO" using a Caesar cipher with a shift of 3:

• Shift each letter 3 places forward:

o H→K

o E→H
o L→O

o L→O

o O→R
Ciphertext: KHOOR

b. Decrypt the ciphertext "VWDQGD" using a Caesar cipher with a shift of 3:

• Shift each letter 3 places backward:

o V→S

o W→T

o D→A

o Q→N

o G→D

o D→A
Plaintext: STANDA

c. Encrypt the plaintext "OPENAI" using a Vigenère cipher with the keyword "CRYPTO":

• Assign numerical values to letters (A=0, B=1, ..., Z=25).

• Repeat the keyword to match the length of plaintext: CRYPTO → CRYPTO.

Plaintext: O (14) P (15) E (4) N (13) A (0) I (8)

Key: C (2) R (17) Y (24) P (15) T (19) O (14)

Ciphertext: Q (16) G (6) C (2) C (2) T (19) W (22)

Ciphertext: QGCCTW

3. Cryptographic Algorithms
Explain the concept of a hash function and provide an example:

• A hash function takes an input and produces a fixed-size string (hash) that uniquely represents
the data.

• Properties: Deterministic, fast, collision-resistant (different inputs don’t produce the same
hash).

• Example: MD5 (Message Digest 5), which produces a 128-bit hash value.

You might also like