0% found this document useful (0 votes)
20 views2 pages

Project2 Objectivce+Deliverables+Rubrics

The project focuses on improving cryptanalysis skills for classical encryption algorithms through frequency analysis and recommends modifications for enhanced security. It involves implementing an encryption algorithm based on mono-alphabetic substitution and Caesar Cipher shifts, followed by an automated frequency analysis technique. Deliverables include frequency analysis of letters, diagrams, trigrams, validity checks against a dictionary, user interaction, security recommendations, and a comprehensive report documenting the process.

Uploaded by

k768d9t6kr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views2 pages

Project2 Objectivce+Deliverables+Rubrics

The project focuses on improving cryptanalysis skills for classical encryption algorithms through frequency analysis and recommends modifications for enhanced security. It involves implementing an encryption algorithm based on mono-alphabetic substitution and Caesar Cipher shifts, followed by an automated frequency analysis technique. Deliverables include frequency analysis of letters, diagrams, trigrams, validity checks against a dictionary, user interaction, security recommendations, and a comprehensive report documenting the process.

Uploaded by

k768d9t6kr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

RIT Dubai

CSCI 462: Introduction to cryptography


Project-Phase2
Summer semester/2024
Objective:
Students will be able to improve their ability to cryptanalyze classical encryption
algorithms using frequency analysis of single letters, diagrams, trigrams, key
length and related skills. Based on this they should be able to recommend possible
modification on the way the algorithm is working to improve its security.
[CLO1. Implement and cryptanalyze classical ciphers.]

What is the project?


Consider an encryption algorithm that works as follows
1- An initial key is exchanged based on a mono-alphabetic initial substitution
table (configuration) that is shared between the two communicating parties.
2- Encryption is done by substituting the first character plain text letters with
cipher text letters according to the initial configuration.
3- The next letter is substituted based on the Caesar Cipher shift that depends
on the value of the previous letter encrypted by substitution.
4- The Third letter is again substituted using mono-alphabetic cipher as in step-
1.
5- The fourth letter is again done based on the same process explain in step-3
and so on.
Example:
Assume the following initial configuration (red table) that represents the key

1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
a b c d e f g h i j k l m n o p q r s t u v w x y z
h i L w m k b d p c v a z u s j g r y n q x o f t e
Now consider the following plain text and its corresponding cipher text.

Plain text: if we had anything confidential to say.


Cipher text:
po ot diw …

The deliverables and Rubrics of this project are the following:


NOTE: your final grade will be affected by the demonstration and discussion
session that is an item of this project that affects other items and accordingly your
final grade in the project.

Implement and run, show screenshots with annotation, an automated frequency


analysis technique using frequency analysis that allow you to:
1. [15%] Decide on the frequency of single letters.
2. [15%] Decide on the frequency of diagrams.
3. [15%] Decide on the frequency of trigrams.
4. [20%] check for the validity of discovered words according to an English
word list or dictionary.
5. [15%] The technique can be interactive. This means that it can interact with
the user to get his/her input related to the discovered frequency and in case
there is a potentially similar frequency then the user can help in deciding on
how the software should move forward.
6. [10%] Recommendation for improving the security of the encryption and
decryption techniques based on the results of the cryptanalysis.
7. [10%] Write a report to document all the steps above. This report should
contain all the elements of a well-organized report such as introduction,
objectives, description of the algorithm and the development of
cryptanalysis technique and discussion of results, summary, references, and
add your code as an appendix.

You might also like