0% found this document useful (0 votes)
18 views

Aayush K.C. - N9 - Week 3

Uploaded by

np01nt4s230058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Aayush K.C. - N9 - Week 3

Uploaded by

np01nt4s230058
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Table of Contents

Question 01. In your own words, describe the importance of cryptography in the domain information
security ......................................................................................................................................................... 2
1. Confidentiality: ..................................................................................................................................... 2
2. Authentication: .................................................................................................................................... 2
3. Data integrity:....................................................................................................................................... 2
4. Non-repudiation: .................................................................................................................................. 2
Question 02. Elaborate what are Symmetric and Asymmetric encryption systems ................................. 2
1. Symmetric Key Encryption: .................................................................................................................. 2
2. Asymmetric Key Encryption: ................................................................................................................ 3
Question 03. Elaborate when a cryptographic algorithm is considered to be Unconditionally secured? 3
Question 04. Discuss the two criteria when a cryptographic system is considered to be
Computationally secured. ............................................................................................................................ 3
Question 05. Describe the working methodology of Caesar Cipher by providing a suitable example. .... 4
1. Choose a Shift Value: ........................................................................................................................... 4
2. Encrypting a Message: ......................................................................................................................... 4
3. Decrypting a communication: .............................................................................................................. 5
Question 01. In your own words, describe the importance of cryptography in the
domain information security

Cryptography is a field of study that deals with the conversion of normal message text into a
more secure and unreadable form so that the information(message) can be kept more secure
that can be read back only by a few authorized individuals.

The importance of cryptography can be understood by understanding below mentioned benefits:

1. Confidentiality: Cryptographic techniques such as symmetric and asymmetric encryption keep


the data safe and secure by restricting access to unauthorized individuals.

2. Authentication: Cryptographic techniques such as MAC algorithms and digital signatures


provide a robust method of authentication of users. They are used as the standard method of
authentication in the majority of authentication systems.

3. Data integrity: Hash functions that are part of cryptography maintain the data integrity of the
users.

4. Non-repudiation: The digital signature facilitates the service of non-repudiation which means
that the originality or validity of the document that is digitally signed cannot be objected and one
must accept it as the original. (Anon., Jan 1, 2023)

Question 02. Elaborate what are Symmetric and Asymmetric encryption systems

1. Symmetric Key Encryption: Encryption is a process to change the form of any message in
order to protect it from reading by anyone. In Symmetric-key encryption the message is
encrypted by using a key and the same key is used to decrypt the message which makes it easy
to use but less secure. It also requires a safe method to transfer the key from one party to
another.

2. Asymmetric Key Encryption: Asymmetric Key Encryption is based on public and private key
encryption techniques. It uses two different key to encrypt and decrypt the message. It is more
secure than the symmetric key encryption technique but is much slower. (Anon., May 22 ,2023)

Question 03. Elaborate when a cryptographic algorithm is considered to be


Unconditionally secured?

When a cipher text generated by an algorithm cannot be cracked by an attacker because


it does not contain enough information regarding the plain text or the encryption key is as
long as the plain text and the total cost of breaking the cipher text is higher than the cost
of the information extracted from the decrypted plain text or when the required time to
break the cipher text is much longer and would make the value of the information gained
from the decrypted plain text inconsequential, then such an algorithm is an unconditionally
secure algorithm. An example of this kind of algorithm would be the one-time pad or OTP
which uses an encryption key that is as long as the plain text and is also time bound to
become useless after a certain period of time. (Anon., Dec 1, 2022)

Question 04. Discuss the two criteria when a cryptographic system is considered to
be Computationally secured.

A cryptographic system or cipher is known as “computationally secure” using the below


2 criteria -

1. It cannot be decryptied back using any amount of available computing power.

2. It cannot be decryptied back within a finite amount of time.


Hence the above are two criteria on which basis a cryptographic system can be
considered as “computationally secured”. In other words, the ciphers that cannot be
broken using any volume of computing power or cannot be broken within a finite time are
called computationally secured. (Anon., Jan 1, 2023)

Question 05. Describe the working methodology of Caesar Cipher by providing a


suitable example.

One of the simplest and oldest encryption algorithms is the Caesar Cipher, often known as the
Caesar Shift or Caesar's Code. It is a substitution cipher that works by shifting each letter in the
plaintext down or up the alphabet by a fixed number of positions. This is how it works:

1. Choose a Shift Value: The first step in employing the Caesar Cipher is to select a shift value,
which is a positive integer. This shift value specifies how far each letter in the plaintext is shifted
in the alphabet. For example, if the shift value is 3, each letter in the plaintext will be shifted
down the alphabet three positions.

2. Encrypting a Message: To encrypt a message using the Caesar Cipher, you shift each letter in
the plaintext according to the shift value you specify. Here's an easy example using a shift value
of 3:

HELLO in plain text


3 shift value

Encryption Method:

H is changed to K (moved three positions to the right).

E transforms into H L, which transforms into O L, which transforms into R.

Text Encrypted: KHOOB

As a result, "HELLO" encrypted with a Caesar Cipher with a shift value of 3 becomes "KHOOB.

3. Decrypting a communication: To decrypt a Caesar Cipher-encrypted communication, simply


reverse the process. Each letter in the encrypted text is shifted back by the same amount. Using
the preceding example with a shift value of 3:

Shift Value: 3 Encrypted Text: KHOOB

Decryption Method:

K is changed to H (moved three positions to the left).

H becomes E O becomes L O B becomes Y Decrypted Text: HELLO

As a result, "KHOOB" decoded with a Caesar Cipher and a shift value of 3 produces "HELLO."

It's crucial to note that the Caesar Cipher is a fairly simple and easily broken encryption scheme,
with just 25 potential shift values (excluding the no-shift case), making it vulnerable to brute force
attacks. For securing sensitive information, more advanced encryption approaches, such as the
use of contemporary cryptographic algorithms, are recommended.

You might also like