Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Alice and Bod have decided to use a symmetric encryption algorithm. They have some assumptions about their messages: - Messages only contain capital letters (
Alice and Bod have decided to use a symmetric encryption algorithm. They have some
assumptions about their messages:
Messages only contain capital letters ie A to Z
The length of their shared key must be greater than or equal to the length of the plaintext
They assign each letter a number as follows: ABCDZ
Their algorithm combines the key and the message using modular addition. The numerical values
of corresponding message and key letters are added together, modulo For example, if the plain
text is HELLO and the key is SECRET then the encrypted message is calculated as following:
Since the length of the plaintext is we just need the first letters of the key ieSECRE then
for each letter, we should add corresponding letters in both the plaintext and the key modulo
Plaintext: H E L L O
Key: S E C R E
Cipher: Z I N C S
a Write a program in Python, CC or JavaScript to take both the plaintext and the key as
its input, then print out the cipher. Assume the plaintext is your name, for the
keyTHISISANEXAMPLEKEYINCOMPUTERSECURITYEXAM what is the
output? Add the screenshots of your program along the input and output and submit it as a
PDF file. You should also submit the source code marks
b Explain how one can decrypt the encrypted message using the encryption algorithm in part
a Write a program, in JavaScript, CC or Python to take both the plaintext and the key
as its input, then print out the plaintext. Test it using the results of the previous program.
Add the screenshots of your program along the input and output and submit it as a PDF
file. You should also submit the source code marks
c Under what conditions specify two can a cipher be broken, meaning that an attacker can
decipher the encrypted message without having the key? Support your reasoning with
examples marks
d Identify THREE key factors for defining a robust key to enhance algorithm security?
Explain your reasons marks
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started