0% found this document useful (0 votes)
23 views3 pages

Assignment 8

The document outlines a series of assignments related to cryptography and network security, focusing on the use of Caesar ciphers for encryption and decryption. Each assignment includes steps to derive a Caesar key from a polynomial and apply it to decrypt messages, with specific examples provided. Additionally, it discusses the handling of encoded characters and the implications of using public keys in cryptographic systems.

Uploaded by

gledisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Assignment 8

The document outlines a series of assignments related to cryptography and network security, focusing on the use of Caesar ciphers for encryption and decryption. Each assignment includes steps to derive a Caesar key from a polynomial and apply it to decrypt messages, with specific examples provided. Additionally, it discusses the handling of encoded characters and the implications of using public keys in cryptographic systems.

Uploaded by

gledisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

GLEDISA BASHA -Assignment 8

Information and Communication Security

Cryptography & Network Security

Class Assignment 1

ReturnToBase

XYZ

Note: decrypt using k=x3 - x2 + x -1 (F is 1; o is 2; l is 3, etc)

Resulting number is used shifting right for that number

Using the Caesar key write the cypher key

Step 1: Derive the Caesar Key

Apply the provided polynomial, k = x^3 - x^2 + x - 1, to the first letter "R" (position 18 in the
alphabet).
R = 18 k = (18^3) - (18^2) + (18) - 1 = 5832 - 324 + 18 - 1 = 5521

Handling large keys:

Caesar ciphers commonly employ keys ranging from 0 to 25. We can confirm that the key
falls within this range by calculating the remaining after dividing 5521 by 26 (the number of
alphabet letters).

Remainder = 5521% (26 = 21)


Thus, the Caesar key generated from the initial letter "R" is 21.

Step 2: Decrypt using Caesar Cipher (Shift Right 21).

In Caesar ciphers, shifting right is similar to shifting left by the number of places left after
deducting the key from the alphabet length (26).

Number of positions to shift left: 26 - 21 = 5


Shift each letter in the message (excluding "XYZ") 5 places to the left (ahead in the
alphabet).

R to W (Shift 5)
e = i, t = o, and u = z.
r -> w n -> q
T to Y, o to t, and B to G.
Decrypted message using Caesar cipher: WiozwQY tG

Step 3: Handle encoded characters (XYZ)

The characters "XYZ" may not be part of the Caesar cipher and might be encoded differently.
We can't absolutely interpret "XYZ" in this situation since we don't know more about its
encoding strategy.

Class Assignment 2

AttackOnMonday

XYZ

Note: decrypt using k=x*x*x - x*x + x-1 (F is 1; o is 2; l is 3, etc)

Resulting number is used shifting right for that number

Using the Caesar key write the cypher key

Step 1: Derive the Caesar Key

Apply the provided polynomial, k = x^3 - x^2 + x - 1, to the first letter "A" (position 1 in the
alphabet).
A = 1 k = (1^3) - (1^2) + (1) - 1 = 1 - 1 + 1 - 1 = 0. Handling Zero Key:

A Caesar key of 0 indicates that no shift is done during decryption. This is a real possibility.

Step 2: Decrypt using Caesar Cipher (no shift)

The characters do not move locations since the key is 0. The message stays the same.

AttackOnMonday

Step 3: Handle encoded characters (XYZ)

The characters "XYZ" may not be part of the Caesar cipher and might be encoded differently.
We can't absolutely interpret "XYZ" in this situation since we don't know more about its
encoding strategy.

Cipher Key as a Public Key

In a normal cryptographic system, it is unlikely that the generated Caesar key (0) will be
public. Public keys are often designed to be made public and used for encryption, whilst
private keys are kept hidden for decoding. In this scenario, the generated key (0) appears to
be utilized solely for decrypting the message itself.

Class Assignment 3

aozchaagl

XYZ
Using the Caesar key write the Decypher key
Find the Plain Text from this Cypher=aozchaagl

Alphabet: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
Index: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25.

Ciphertext: Aozchaagl

Shifting 3 positions to the left:

'a' (index 0) -> 'x' (index 23)


'o' (index 14) -> 'l' (index 11)
'z' (index 25) -> 'w' (index 22)
'c' (index 2) -> 'z' (index 25)
'h' (index 7) -> 'e' (index 4)
'a' (index 0) -> 'x' (index 23)
'a' (index 0) -> 'x' (index 23)
'g' (index 6) -> 'd' (index 3)
'l' (index 11) -> 'i' (index 8)

Plaintext: xlwzexxdi

Home Assignment 4

adnucnhfsnlzzt

XYZ

Using the Caesar key write the Decypher key

Find the Plain Text from this Cypher= adnucnhfsnlzzt

a -> (a-3) mod 26 = x d -> (d-3) mod 26 = w n -> (n-3) mod 26 = m u -> (u-3) mod 26 = r c ->
(c-3) mod 26 = a n -> (n-3) mod 26 = m h -> (h-3) mod 26 = e f -> (f-3) mod 26 = c s -> (s-3)
mod 26 = p n -> (n-3) mod 26 = m l -> (l-3) mod 26 = k z -> (z-3) mod 26 = w z -> (z-3) mod
26 = w t -> (t-3) mod 26 = s

You might also like