0% found this document useful (0 votes)
2 views1 page

Assignment 2

This document outlines the instructions for ITIS-329 Information Security Assignment #2, which is due on March 7, 2025. Students are required to handwrite their assignments using specific ink colors and include a title page with essential details. The assignment consists of comparing various ciphers and discussing the effectiveness of frequency analysis on different encryption algorithms.

Uploaded by

sibte638
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views1 page

Assignment 2

This document outlines the instructions for ITIS-329 Information Security Assignment #2, which is due on March 7, 2025. Students are required to handwrite their assignments using specific ink colors and include a title page with essential details. The assignment consists of comparing various ciphers and discussing the effectiveness of frequency analysis on different encryption algorithms.

Uploaded by

sibte638
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ITIS-329 Information Security

Assignment # 2
Course Teacher: Miss Shagufta Iftikhar
Date Given: Feb. 28, 2025 Deadline for Submission: Mar. 7, 2025
Instructions:

 This assignment is to be solved by hand in your own handwriting. Use blue or black ink pen or
ballpoint pen to solve your assignment.
 Use of any other color ballpoint or ink pen, or lead pencil is prohibited.
 The assignment must have a title page containing (a) Course code (b) Course title (c) Your
registration number (d) Your name (e) Assignment number.
 The assignment must be submitted at the start of class on the due date. Late submitted assignments
will not be accepted.
 Avoid copying your assignment, copied assignments will be awarded zero marks.

Q1. Compare the following ciphers by providing a detailed explanation of how each cipher
works, and list their strengths, and vulnerabilities.

1. Substitution Ciphers:
 Monoalphabetic Ciphers (Single alphabet substitution)
 Caesar Cipher
 ROT13
 Affine Cipher
 Polyalphabetic Ciphers (Multiple alphabets substitution)
 Vigenère Cipher
 One-Time Pad (OTP)
2. Transposition Ciphers:
 Rail Fence Cipher
 Columnar Transposition Cipher
3. Product Ciphers:
 Rotor Machines (e.g., Enigma Machine)

Q2. List all above encryption algorithms where frequency analysis can be used effectively
and explain why it works for each. Also, mention any encryption algorithms where
frequency analysis is ineffective and justify your answer.

You might also like