University | James Cook University (JCU) |
Subject | CP3404 Information Security |
Assignment: Cryptanalysis + Tutorial
Overview
In this assignment, you will decrypt a given ciphertext using the specified cipher technique, documented in a report. Following the decryption process, you will create a 10-15-minute recorded tutorial presentation to teach others about the given cipher technique. This involves explaining the historical background of the cipher, its strengths and weaknesses, and a detailed, step-by-step guide on how to encode and decode messages using the cipher. This should be supported by your own decryption of the ciphertext as an example. The tutorial should also touch on potential use cases for the cipher and explain its relevance in modern cryptography.
This assignment will not only help you improve your technical understanding of cryptographic ciphers but also enhance your ability to communicate complex concept effectively to others, a valuable skill in information security. We recommend following the Assertion-Evidence approach for presentations.
Key Requirements
There are two key deliverables that you are required to produce for this assignment.
1. Ciphertext Decryption Report
- You will be provided with details of a cipher that you must learn (e.g., Vigenère cipher, Caesar cipher, Playfair cipher, etc.) – see Appendix 1.
- You will be given a ciphertext to decode using the above method – see Appendix 2.
- Document your step-by-step process for decrypting the plaintext message in a detailed a clear manner, explaining each action taken, any assumptions made, and any challenges faced during the process.
2. Tutorial Presentation
- Create a 10–15-minute video tutorial that should cover the following:
- Historical Background:
- Provide a brief history of the cipher, including who created it, its original purpose, and any significant events or uses related to it.
- Strengths and Weaknesses:
- Explain the key strengths and weaknesses of the cipher. Consider its security in the historical context versus modern cryptographic standards.
- Step-by-Step Encoding and Decoding:
- Walk through the encoding and decoding process using the cipher. Be sure to use your decryption of the given ciphertext as an example, illustrating how someone would encode and decode messages using this method.
- Potential Use Cases:
- Discuss the types of use cases for which the cipher might be useful, both historically and in modern cryptographic applications.
- Real-World Relevance:
- Briefly touch on how this cipher (or similar ciphers) is relevant in today’s cryptographic world, including its role in understanding modern encryption methods.
- Historical Background:
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
Submission and Formatting Guidelines
- Written Report:
- Word count: 1,000 – 1,500 words.
- Use clear headings and subheadings to organise the document.
- Include images or diagrams where necessary to illustrate your points, especially to help clearly explain your decryption process.
- Include citations for any sources used.
- Video Tutorial:
- Duration: 10 – 15 minutes.
- Make sure your voice is clear and audible.
- Ensure your face is included in the presentation (use a webcam).
- Use slides and screen-sharing to illustrate your explanations.
- Ensure that any demonstrations (e.g., step-by-step cipher encoding and decoding) are visible and easy to follow.
- OBS Studio is a recommended software tool for recording your video.
- Submit your written report and video tutorial to the submission link on LearnJCU.
Academic Integrity
- This is an individual assignment. You are expected to complete this assignment independently. Any form of academic misconduct, including plagiarism and collusion, will be pursued according to the Coursework Academic Integrity Policy and Procedures.
- Proper citations should be provided for any historical facts, sources, or content that is not your own or that you have consulted during the preparation of the assignment.
Generative Artificial Intelligence (AI) Guidelines
- Per the subject outline, Generative AI tools are restricted in this assessment item.
- This means that you can use Generative Artificial Intelligence (GenAI) to obtain information only. Any use of generative AI must be appropriately acknowledged and include a Declaration of AI-Generated Material (submit this with the assignment).
Marking Rubric
Appendix 1: Vigenére cipher
Background
Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate timeframe.
Julius Caessar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows the original English alphabet and the corresponding cryptogram alphabet in Caesar cipher:
a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c
Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher.
To use mathematical notations, lets convert the letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, …, 24, 25 to a, b, …, y, z, respectively. Using this conversion, Caesar cipher can be expressed as:
C = Ek(M) = M + 3 (mod 26)
where ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘k’ is the key, ‘M’ is the message/plaintext (one may replace integer 3 by letter ‘d’).
Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are only 26 possible keys/shifts.
Buy Custom Answer of This Assessment & Raise Your Grades
Vigenére Cipher
In Vigenére cipher the key is more than one letter. That is, Vigenére cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword).
Consider an example where the message/plaintext is ‘individual character’ and the keyword is ‘host’. Vigenére cipher encrypts the message as follows:
Plaintext i n d i v i d u a l c h a r a c t e r
Keyword h o s t h o s t h o s t h o s t h o s
Cryptogram p b v b c w v n h z u a h f s v a s j
That is, the first four letters of the cryptogram are computed as:
‘i’ + ‘h’ = 8 + 7 = 15 (mod 26) i.e., p
‘n’ + ‘o’ = 13 + 14 = 1 (mod 26) i.e., b
‘d’ + ‘s’ = 3 + 18 = 21 (mod 26) i.e., v
‘i’ + ‘t’ = 8 + 19 = 1 (mod 26) i.e., b
Since the plaintext is longer than the keyword, keyword is repeated until all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘i’ from the plaintext is encrypted with ‘h’, where its second and third occurrences are encrypted with the letters ‘t’ and ‘o’ respectively. That is, Vigenére cipher is a polyalphabetic substitution cipher.
To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the key-length of the cipher. This can be done using Kassiski method. The Kassiski method uses repetitions of patterns in the ciphertext to make a good guess about the key-length. For example, suppose the plaintext ‘to be or not to be’ has been enciphered using the key ‘now’, producing the ciphertext below:
Plaintext t o b e o r n o t t o b e
Keyword n o w n o w n o w n o w n
Cryptogram g c x r c n a c p g c x r
In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), where the distance between these repetitions (i.e., the number of characters form the first letter of the pattern in its first occurrence to the first letter of its second occurrence) is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigenére cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Note that for longer cryptograms, we can look for multiple repeating patterns of different characters and calculate the distances between these repeating patterns. The greatest common divisor of those distances may give an indication of the possible key-length.
Once we have the key length (k), we split the cryptogram into k cryptograms. For the current example, assuming that the key length is 3, we split the cryptogram into three cryptograms. That is, the 1st, 4th, 7th, … characters of the cryptogram are the result of encrypting the 1st, 4th, 7th, … characters of the plaintext with the first letter of the keyword (in other words, they are shifted with the same number, as in the Caesar cipher). Similarly, the 2nd, 5th, 8th, … characters are the result of encrypting the corresponding letters in the plaintext with the second letter of the key, and the same for the third. That is, this Vigenére cipher is a combination of 3 Caesar ciphers, where the cryptogram of each Caesar cipher is given as below:
Cryptogram 1: g r a g r
Cryptogram 2: c c c c
Cryptogram 3: x n p r
To break each of these Caesar ciphers, we can use the letter frequency in the English text. As shown in Figure 2, ‘e’ is the most common letter used in English texts. That is:
In Cryptogram 1, we can guess that ‘g’ or ‘r’ could be the corresponding letter to ‘e’ in the plaintext.
If ‘g’ corresponds to ‘e’, then the first letter of the key should be ‘g’ – ‘e’ = 6 – 4 = 2, which is ‘c’.
If ‘r’ corresponds to ‘e’, then the first letter of the key should be ‘r’ – ‘e’ = 17 – 4 = 13, which is ‘n’.
In Cryptogram 2, we can guess that ‘c’ is the corresponding letter to ‘e’ in the plaintext.
If ‘c’ corresponds to ‘e’, then the second letter of the key could be ‘c’ – ‘e’ = 2 – 4 = -2 = 24 (calculate mod 26), which is ‘y’.
In Cryptogram 3, each character appears only once, and thus letter frequency does not work.
Remark: This example is simply to show the mechanism of the Kassiski attack. The attack is very effective for large cryptograms (e.g., the size of the cryptograms given in this assignment). You should always consider other potential letters based on letter frequency to determine the correct letter in the keyword (i.e., the most repeated letters won’t always be ‘e’).
Figure 2: Letter frequencies in English texts.
Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers
Appendix 2: Ciphertexts
The following are 10 cryptograms that are created by the Vigenere cipher, where the plaintext is complete English text, and the keyword is a meaningful English word. You are required to decipher the cryptogram that matches with your Student ID.
Cryptogram for whom their Student-ID is XXXXXXX7
mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq
hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx
uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx
btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg
axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm
lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj
sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh
kzpwywivmkvvkmrtx
If you are facing problems in writing the CP3404 Information Security Report, then don't worry! Assignment Help Singapore is specially designed for Singapore students. There are specialized PhD qualified writers for all subjects who provide you 100% original content and help you score high grades in academics. Avail the report writing service now and submit your high-quality assignment before the deadline!
Looking for Plagiarism free Answers for your college/ university Assignments.
- CH2123 Assignnment : Fugacity, VLE Modeling & Henry’s Law Applications
- BAFI1045 Assignment -Constructing and Evaluating Passive and Active Portfolios Based on the Straits Times Index (STI)
- PSB501EN Assignment 1: Engineering Systems Integration: A Multi-Technique Approach to Mechanical Analysis
- FIN2210E/FIN2212E Group Assignment: Financial Risk Management Analysis of Bursa Malaysia Companies
- FLM101 Assignment: A Cinematic Dissection: Stylistic Elements and Their Thematic Significance
- Assignment: Transforming Talent in the AI Era: From War to Wealth through Ecosystem Innovation
- COMP 1105 Assignment: Health-Focused E-Commerce Website: A Web Technologies Project Using HTML5, CSS, and JavaScript
- Assignment: Machine Learning in Robo-Advisory Services: Evolution, Applications, and Future Trends
- OMGT2229 Assignment: Quantitative Forecasting, Economic Order Analysis, and Strategic Sourcing Decision-Making for JB Hi-Fi
- Assignment 2: Corporate Finance and Planning: An In-Depth Financial Analysis of Company