0% found this document useful (0 votes)
172 views3 pages

DCOM 214 Module 03 Cryptography Lab

This document outlines a cryptography lab assignment with 9 questions involving different encryption techniques including the Caesar cipher, Vigenere cipher, Split Rail cipher, transposition cipher, and a combination cipher using the Vigenere cipher and transposition cipher. Students are asked to encrypt given plaintexts using the specified algorithms and document their ciphertext, keys, and other relevant details.

Uploaded by

Dee fors
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
172 views3 pages

DCOM 214 Module 03 Cryptography Lab

This document outlines a cryptography lab assignment with 9 questions involving different encryption techniques including the Caesar cipher, Vigenere cipher, Split Rail cipher, transposition cipher, and a combination cipher using the Vigenere cipher and transposition cipher. Students are asked to encrypt given plaintexts using the specified algorithms and document their ciphertext, keys, and other relevant details.

Uploaded by

Dee fors
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab Assignment 2

Module 3: Cryptography

Total Points: 20 points


Due Date: 03.13 (by 11:59pm)
Submission Requirements: write your answers directly on this sheet
Legend: c=ciphertext; k=key(word); p=plaintext
Note: for all Vigenere ciphers, use Figure 1-5 on pg. 13 (textbook)

Name (please print): _______________________________

1. (2 points) Encrypt the following plaintext message - Operating System - which


was encrypted using the Caesar shift with a shift of 5. Fill in the fields below:

O= S=
P= Y=
E= S=
R= T=
A= E=
T= M=
I=
N=
G=

2. (2 points) What type of algorithm is being used in the previous question?

3. (2 points) Using the Vigenere cipher with the key(word) math, create the
ciphertext for the plaintext message, I love this! Fill in the fields below:

k:
p:
c:

4. (2 points) What type of algorithm is being used in the previous question?

5. (2 points) Using the Split Rail cipher, encrypt the following plaintext message,
Crypto is fun! Fill in the fields below:

p:
Line one:
Line two:
c:

6. (2 points) What type of algorithm is being used in the previous question?

1
Lab Assignment 2
Module 3: Cryptography

7. (2 points) Create a Transposition table (5 characters wide) and encrypt the


following plaintext message, I think I could get into this crypto stuff Fill in the
fields below:

p:

Fill in the Transposition table:

c:

8. (2 points) Building on the ciphertext from the previous question, create a


Numbered Transposition Table, and new ciphertext message:

Fill in the Numbered Transposition table:

4 1 3 5 2

c:

2
Lab Assignment 2
Module 3: Cryptography

9. (4 points) Combine both a Vigenere cipher (key: DCOM) and a Numbered


Transposition table cipher (3 characters wide) to encrypt the following plaintext
message, I like my OS sec class. Fill in the fields below:

k:
p:
Vigenere ciphertext:

Using the Vigenere ciphertext you just calculated, fill in the Numbered
Transposition table accordingly:

3 1 2

Calculate the new ciphertext:


c:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy