Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically).

Requirements, Method of Submission, and Marking Criteria:

- Answer all the following questions in a single document. Each question should begin on a new page.

- For each of the first two (2) questions, write a report of approximately 800 words in the structure of a scientific paper.

- Include your name on the first page. Include list of references for each question with proper in-text citations.

- For marking criteria of the first 2 questions, see the included rubric.

- In your answer to question 3 (i.e., cryptanalysis), show all your work. Four (4) marks are assigned to the determination of the correct key-length, four (4) marks to the determination of correct keyword and two (2) marks for determination of the complete plaintext (partial marks count). Upload your solution to the Assignment Box, located in the subject's site.

1. Bring Your Own Device (BYOD) Policy

Use the Internet to locate BYOD Policy from two different organizations. After reading that information, create your own BYOD policy for your school or place of employment. What restrictions should be enforced? What control should the organization have over the personal devices?

Write a short (approximately 800 words) report on your research.

2. Open Authentication (OAuth)

Use the Internet to research OAuth. What is the technology behind it? What are its strength? What are its weaknesses? Will it replace OpenID? Would you recommend it for secure applications like online banking?

Write a short (approximately 800 words) report on your research.

3. Cryptanalysis of Polyalphabetic Ciphers:

In this question you learn a classical polyalphabetic substitution cipher (known as Vigenere cipher), and are required to cryptanalysis a given cryptogram. Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate time frame.

Background

Julius Caesar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows original English alphabet and corresponding cryptogram alphabet in Caesar cipher:

a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c

Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher

In order to use mathematical notations, let convert letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, ... 24, 25 to a, b, ..., y, z, respectively. Using this conversion, Caesar cipher can be expressed as:

C = Ek(M) = M + 3 (mod 26)

where `C' is the cryptogram, `E' is the encryption algorithm, `k' is the key, `M' is the message/plaintext (one may replace integer 3 by letter `d').

Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are 26 possible keys/shift.

Vigenere Cipher

In Vigenere cipher the key is more than one letter. That is, Vigenere cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword). Let the message/plaintext be `individual character' and the keyword is `host'. Vigenere cipher encrypts the message as follows:

Plaintext i n d i v i d
Keyword h o s t h o s
Cryptogram p b v b c w v

u a l c h a r a c t e r

t h o s t h o s t h o s

n h z u a h f s v a s j

That is, the first four letters of cryptogram computed as:
‘I' + ‘h' = 8 + 7 = 15 (mod 26) i.e., p
‘n' + ‘o' = 13 + 14 = 1 (mod 26) i.e., b
‘d' + ‘s' = 3 + 18 = 21 (mod 26) i.e., v
‘I' + ‘t' = 8 + 19 = 1 (mod 26) i.e., b

Since the plaintext is longer than the keyword, keyword is repeated till all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘I' from the plaintext is encrypted with `h', where its second and third occurrences are encrypted with letters ‘t', and ‘o' respectively. That is, Vigenere cipher is a polyalphabetic substitution cipher.

To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the period (i.e., the key-length) of the cipher. This can be done using two main tools: the Kassiski method, and the index of coincidence. Here we explain Kassiski method, you may search the Internet for the index of coincidence method.

The Kassiski method uses repetitions in the ciphertext to give clues to the cryptanalyst about the period. For example, suppose the plaintext `to be or not to be' has been enciphered using the key `now', producing the ciphertext below:

Plaintext t o b e o r n o
Keyword n o w n o w n o
Cryptogram g c x r c n a c

t t o b e

w n o w n

p g c x r

In the given cryptogram (i.e., g c x r c n a c p g c x r) contains the pattern g c x r which is repeated and the distance of repetition is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigenere cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Assuming that the key length is 3, we split the cryptogram into three cryptogram. That is, the 1st, 4th, 7th, ...

characters of the cryptogram are the result of the shift of the 1st, 4th, 7th, ... characters of the plaintext where the shift is the first letter of the keyword. Similarly, the 2nd, 5th, 8th, ... letters build another list. That is, this Vigenere cipher is a combination of 3 Caesar cipher.

Your Task:

In the following you can find a cryptogram, that are created by Vigenere cipher, where the plaintext is English text and the keyword is meaningful English word. You are required to decipher the cryptogram that matches with your Student-ID.

Attachment:- Advanced E securities.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93083551
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Network requirement analysis and planpurpose of the

Network requirement analysis and plan Purpose of the assessment (with ULO Mapping) Main objective of this assignment is to enable student to understand networking devices, gather requirements for a given business case st ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Since quotas do not raise revenues but have the same trade

Since quotas do not raise revenues but have the same trade effects as do tariffs, why not just have tariffs? Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenue ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As