0% found this document useful (0 votes)
15 views2 pages

Sheet 3

The document provides an overview of cryptography, including definitions of plaintext, ciphertext, encryption, and decryption. It discusses the properties of encryption functions, such as being one-to-one and onto, and mentions the Caesar cipher as a specific example of a shift cipher. Additionally, it clarifies that none of the provided options match the form of a shift cipher.

Uploaded by

ahmedsamer6788
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Sheet 3

The document provides an overview of cryptography, including definitions of plaintext, ciphertext, encryption, and decryption. It discusses the properties of encryption functions, such as being one-to-one and onto, and mentions the Caesar cipher as a specific example of a shift cipher. Additionally, it clarifies that none of the provided options match the form of a shift cipher.

Uploaded by

ahmedsamer6788
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: Ahmed Samir Awed

Major: mathematics and computer science


Id: 352151186

1. (a) Cryptography
Cryptography is the science and art of transforming messages to make
them secure and immune to attacks.

2. (b) Plaintext
The plaintext is the original message before transformation.

3. (a) Ciphertext
The ciphertext is the message after transformation.

4. (a) Encryption
The eₖ algorithm (encryption algorithm) transforms plaintext to ciphertext.

5. (b) Decryption
The dₖ algorithm (decryption algorithm) transforms ciphertext back to
plaintext.

6. (a) Identity function


The function dₖ(eₖ(x)) should return the original plaintext x, meaning it
acts as an identity function for correct decryption.

7. (d) All of these


The encryption function eₖ should be:

o One-to-One (injective) to ensure unique ciphertext for each


plaintext.

o Onto (surjective) if the ciphertext space equals the plaintext


space.

o Identity function only in trivial cases (e.g., no encryption).

8. (a) Identity function


If plaintext = ciphertext, then the encryption function is the identity
function (no transformation).

9. (c) Caesar cipher


The shift cipher is sometimes referred to as the Caesar cipher (a
historical shift-by-3 cipher).
10. (None of the given options is a shift cipher)
A shift cipher has the form eₖ(x) = (x + k) mod 26, but none of the options
match this form:

o (a) is affine (not shift),

o (b) is affine (not shift),

o (c) is affine (not shift).


So, the correct answer is (d) None of these.

You might also like