homework2

advertisement
Isaac Parenteau
January 15, 2011
Computer Security
Questions #2
2.2) Two basic functions used in an encryption algorithm are substitution and transposition
2.4) a block cipher processes the input one block of elements at a time producing an output block for each input block while a stream cipher
processes the input elements continuously, producing output one element at a time, as it goes along.
2.6) Cipher text only attack –Encryption algorithm and cipher text
Known plaintext attack- Encryption algorithm, cipher text and one or more plaintext
Chosen plaintext attack- Encryption algorithm, cipher text, plaintext message chosen by cryptanalyst, together with its corresponding cipher
text generated with the secret key
Chosen Cipher text attack- Encryption algorithm, cipher text, cipher text chosen by cryptanalyst, together with its corresponding decrypted
plaintext generated with the secret key
Chosen text attack- Encryption algorithm, chipper text, plaintext message chosen by cryptanalyst, together with its corresponding cipher
text generated with secret key and cipher text chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the
secret key
2.8) Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet.
2.10) Play fair cypher treats diagrams in the plaintext as single units and translates these unites into cipher text diagrams. It is based on the use
of a 5x5 matrix of letters constructed using a keyword.
2.12) Two problems with the one-time pad is that there is the practical problem of making large quantities of random keys and problem of key
distribution and protection because for every message to be sent a key of equal length is needed by both sender and receiver.
2.14) Steganography conceals the existence of a message.
2.4
5
A
(
R
;
T
(
R
3
G
8
E
4
H
‡
0
‡
O
8
E
0
L
9
M
‡
O
)
S
6
I
;
T
Character
0
1
2
3
4
5
6
7
8
9
‡
†
(
)
*
;
?
¶
:
]
†
D
5
A
9
M
4
H
3
G
*
N
2
B
8
E
0
L
†
D
8
E
;
T
5
A
;
T
5
A
(
R
Count
6
8
5
4
19
12
11
0
33
5
16
8
9
16
13
26
3
1
2
4
1
)
S
4
H
)
S
8
E
)
S
6
I
;
T
8
E
6
I
(
R
)
S
;
T
Letter
L
F
B
G
H
A
I
E
M
O
D
R
S
N
T
U
C
V
Y
W
*
N
;
T
6
I
4
H
;
T
8
E
†
D
(
R
4
H
8
E
8
E
‡
0
8
E
*
N
)
S
?
U
2
B
9
M
4
H
3
G
6
I
6
I
‡
O
4
H
)
S
*
N
‡
O
;
T
4
H
?
U
;
T
4
H
‡
O
;
T
1
F
8
E
.
P
8
E
(
R
)
S
)
S
)
S
‡
O
4
H
4
H
*
N
9
M
‡
O
‡
O
‡
0
;
T
;
T
)
S
(
R
4
H
1
F
;
T
;
T
8
E
6
I
8
E
4
H
0
L
1
F
0
L
8
E
8
E
;
T
6
I
5
A
1
F
:
Y
*
N
)
S
;
T
1
F
;
T
;
T
8
E
8
E
4
H
5
A
:
Y
8
E
8
E
*
N
8
E
;
T
†
D
†
D
‡
O
‡
0
8
E
2
B
1
F
?
U
¶
V
:
Y
;
T
;
T
6
I
*
N
4
H
0
L
‡
0
8
E
)
S
(
R
†
D
)
S
;
T
8
E
8
E
4
H
5
A
5
A
9
M
;
T
;
T
5
A
4
H
;
T
6
I
)
S
]
W
*
N
4
H
8
E
2
B
8
E
*
N
(
R
5
A
;
T
5
A
+
D
:
Y
*
N
5
A
‡
O
C
2
B
*
N
4
H
8
E
8
E
)
S
8
E
†
D
8
E
0
L
8
E
¶
V
6
I
3
G
8
E
*
N
*
N
8 1
E F
Decipher:
A good glass in the bishops hostel in the devils seat twenty one degrees and thirteen minutes northeast and by north main branch seventh limb
east side shoot from the left eye of the deathshead a bee line from the tree through the shot fifty feet out
2.6) stenography cypher
2.9)
R O
N E
V B
H I/J
Q S
Y
W
C
K
T
A
Z
F
M
U
L
D
G
P
X
PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT
STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE
X REQUEST ANY INFORMATION.
Download