Checkpoint Cryptography & Secure Solution
Checkpoint Cryptography & Secure Solution
Selected Tasks :
• Basic Concept
• Symmetric Key Cryptography
• Cryptographic Algorithms
Solutions
1. Basic Concept
a. Define the terms:
• Encryption: The process of converting plaintext into ciphertext using an algorithm and key to
secure the information.
• Decryption: The process of converting ciphertext back into plaintext using an algorithm and
key.
• Symmetric Cryptography: Uses a single key for both encryption and decryption. It is faster but
requires secure key sharing.
• Asymmetric Cryptography: Uses two keys – a public key for encryption and a private key for
decryption. It is slower but more secure, as the private key is never shared.
2. Integrity: Verifying that the data has not been altered during transmission or storage.
o H→K
o E→H
o L→O
o L→O
o O→R
Ciphertext: KHOOR
o V→S
o W→T
o D→A
o Q→N
o G→D
o D→A
Plaintext: STANDA
c. Encrypt the plaintext "OPENAI" using a Vigenère cipher with the keyword "CRYPTO":
Ciphertext: QGCCTW
3. Cryptographic Algorithms
Explain the concept of a hash function and provide an example:
• A hash function takes an input and produces a fixed-size string (hash) that uniquely represents
the data.
• Properties: Deterministic, fast, collision-resistant (different inputs don’t produce the same
hash).
• Example: MD5 (Message Digest 5), which produces a 128-bit hash value.