Study the scenario and complete the question(s) that follow: Cryptography Cryptography is the technology that powers onl
Posted: Fri Jul 08, 2022 6:17 am
question(s) that follow: Cryptography Cryptography is the technology that powers online encryption, digital authentication, credit card processing, and online banking. Even if you're not familiar with the technology, you likely rely on cryptography daily. A substitution cipher exchanges one value for another. Single alphabet and are known as a monoalphabetic substitution. An advanced type of substitution cipher that uses a simple polyalphabetic code is the Vigenère cipher. The cipher is implemented using the Vigenère square (or table), also known as a tabula recta a term invented by Johannes Trithemius in the 1500s. Table 8-2 illustrates the setup of the Vigenère square, which is made up of 26 distinct cipher alphabets. ITSCA3-B22 - Initial Online Assessment Paper Block 2 2022 | V1.0 Page 5 of 7
A|B|C|D|E F G H I J K L M_N_0_P|QR|S_T_U|V|wxYz AABCDEFGHIJKLMNOPQRSTUVWXYZ BBCDEFGHIJKLMNOPQRSTUVWXYZA CCDEFGHIJKLMNOPQRSTUVWXYZ AB DDEFGHIJKLMNOPQRSTUVWXYZ ABC EEFGHIJKLMNOPQRSTUVWXYZ ABCD FFGHIJKLMNOPQRSTUVWXYZ ABCDE GGHIJKLMNOPQRSTUVWXYZ ABCDEF HHIJKLMNOPQRSTUVWXYZ ABCDEFG IIJKLMNOPQRSTUVWXYZ ABCDEFGH JJKLMNOPQRSTUVWXYZ ABCDEFGHI KKLMNOPQRSTUVWXYZ ABCDEFGHIJ LLMNOPQRSTUVWXYZ ABCDEFGHIJK MMNOPQRSTUVWXYZ ABCDEFGHIJKL NNOPQRSTUVWXYZ ABCDEFGHIJKLM OOPQRSTUVWXYZ ABCDEFGHIJKLMN PPQRSTUVWXYZ ABCDEFGHIJKLMNO QQRSTUVWXYZ ABCDEFGHIJKLMNOP RRSTUVWXYZ ABCDEFGHIJKLMNOPQ SSTUVWXYZ ABCDEFGHIJKLMNOPQR TTUVWXYZ ABCDEFGHIJKLMNOPQRS UUVWXYZ ABCDEFGHIJKLMNOPQRST V V W X Y Z A B C D E F G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U WWXYZ ABCDEFGHIJKLMNOPQRSTUV XXYZABCDEFGHIJKLMNOPQRSTUVW YYZABCDEFGHIJKLMNOPQRSTUVWX ZZABCDEFGHIJKLMNOPQRSTUVWXY Table 8-2 The Vigenère Square Source: Whitman, M.E. and Mattord, H.J. 2017.Principles of Information Security. 6th ed.
Question 6 6.1 You have been hired a security specialist and you have been tasked to decrypt the following cipher text. Suppose a columnar transposition of 9 columns was used to produce the cipher-text WLOWA PELNH NHLEG YSOLD NDWNI TUIEE FHDMR IEBYT CWEOH ARRUE. (10 Marks) Decipher the message. 6.2 Encrypt the following message using Caesar cipher with a key of 3 SECURITY IS THE KEY TO INFORMATION SYSTEMS What is the encrypted message that will be sent to Abel? ITSCA3-B22 - Initial Online Assessment Paper Block 2 2022 | V1.0 (7 marks) Page 6 of 7 6.3 Using the Vigenère cipher mentioned in the scenario. Encrypt the following phrase using key words ITALY: SACK GAUL SPARE NO ONE (8 marks)
Study the scenario and complete the A|B|C|D|E F G H I J K L M_N_0_P|QR|S_T_U|V|wxYz AABCDEFGHIJKLMNOPQRSTUVWXYZ BBCDEFGHIJKLMNOPQRSTUVWXYZA CCDEFGHIJKLMNOPQRSTUVWXYZ AB DDEFGHIJKLMNOPQRSTUVWXYZ ABC EEFGHIJKLMNOPQRSTUVWXYZ ABCD FFGHIJKLMNOPQRSTUVWXYZ ABCDE GGHIJKLMNOPQRSTUVWXYZ ABCDEF HHIJKLMNOPQRSTUVWXYZ ABCDEFG IIJKLMNOPQRSTUVWXYZ ABCDEFGH JJKLMNOPQRSTUVWXYZ ABCDEFGHI KKLMNOPQRSTUVWXYZ ABCDEFGHIJ LLMNOPQRSTUVWXYZ ABCDEFGHIJK MMNOPQRSTUVWXYZ ABCDEFGHIJKL NNOPQRSTUVWXYZ ABCDEFGHIJKLM OOPQRSTUVWXYZ ABCDEFGHIJKLMN PPQRSTUVWXYZ ABCDEFGHIJKLMNO QQRSTUVWXYZ ABCDEFGHIJKLMNOP RRSTUVWXYZ ABCDEFGHIJKLMNOPQ SSTUVWXYZ ABCDEFGHIJKLMNOPQR TTUVWXYZ ABCDEFGHIJKLMNOPQRS UUVWXYZ ABCDEFGHIJKLMNOPQRST V V W X Y Z A B C D E F G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U WWXYZ ABCDEFGHIJKLMNOPQRSTUV XXYZABCDEFGHIJKLMNOPQRSTUVW YYZABCDEFGHIJKLMNOPQRSTUVWX ZZABCDEFGHIJKLMNOPQRSTUVWXY Table 8-2 The Vigenère Square Source: Whitman, M.E. and Mattord, H.J. 2017.Principles of Information Security. 6th ed.
Question 6 6.1 You have been hired a security specialist and you have been tasked to decrypt the following cipher text. Suppose a columnar transposition of 9 columns was used to produce the cipher-text WLOWA PELNH NHLEG YSOLD NDWNI TUIEE FHDMR IEBYT CWEOH ARRUE. (10 Marks) Decipher the message. 6.2 Encrypt the following message using Caesar cipher with a key of 3 SECURITY IS THE KEY TO INFORMATION SYSTEMS What is the encrypted message that will be sent to Abel? ITSCA3-B22 - Initial Online Assessment Paper Block 2 2022 | V1.0 (7 marks) Page 6 of 7 6.3 Using the Vigenère cipher mentioned in the scenario. Encrypt the following phrase using key words ITALY: SACK GAUL SPARE NO ONE (8 marks)