Aayush K.C. - N9 - Week 3
Aayush K.C. - N9 - Week 3
Question 01. In your own words, describe the importance of cryptography in the domain information
security ......................................................................................................................................................... 2
1. Confidentiality: ..................................................................................................................................... 2
2. Authentication: .................................................................................................................................... 2
3. Data integrity:....................................................................................................................................... 2
4. Non-repudiation: .................................................................................................................................. 2
Question 02. Elaborate what are Symmetric and Asymmetric encryption systems ................................. 2
1. Symmetric Key Encryption: .................................................................................................................. 2
2. Asymmetric Key Encryption: ................................................................................................................ 3
Question 03. Elaborate when a cryptographic algorithm is considered to be Unconditionally secured? 3
Question 04. Discuss the two criteria when a cryptographic system is considered to be
Computationally secured. ............................................................................................................................ 3
Question 05. Describe the working methodology of Caesar Cipher by providing a suitable example. .... 4
1. Choose a Shift Value: ........................................................................................................................... 4
2. Encrypting a Message: ......................................................................................................................... 4
3. Decrypting a communication: .............................................................................................................. 5
Question 01. In your own words, describe the importance of cryptography in the
domain information security
Cryptography is a field of study that deals with the conversion of normal message text into a
more secure and unreadable form so that the information(message) can be kept more secure
that can be read back only by a few authorized individuals.
3. Data integrity: Hash functions that are part of cryptography maintain the data integrity of the
users.
4. Non-repudiation: The digital signature facilitates the service of non-repudiation which means
that the originality or validity of the document that is digitally signed cannot be objected and one
must accept it as the original. (Anon., Jan 1, 2023)
Question 02. Elaborate what are Symmetric and Asymmetric encryption systems
1. Symmetric Key Encryption: Encryption is a process to change the form of any message in
order to protect it from reading by anyone. In Symmetric-key encryption the message is
encrypted by using a key and the same key is used to decrypt the message which makes it easy
to use but less secure. It also requires a safe method to transfer the key from one party to
another.
2. Asymmetric Key Encryption: Asymmetric Key Encryption is based on public and private key
encryption techniques. It uses two different key to encrypt and decrypt the message. It is more
secure than the symmetric key encryption technique but is much slower. (Anon., May 22 ,2023)
Question 04. Discuss the two criteria when a cryptographic system is considered to
be Computationally secured.
One of the simplest and oldest encryption algorithms is the Caesar Cipher, often known as the
Caesar Shift or Caesar's Code. It is a substitution cipher that works by shifting each letter in the
plaintext down or up the alphabet by a fixed number of positions. This is how it works:
1. Choose a Shift Value: The first step in employing the Caesar Cipher is to select a shift value,
which is a positive integer. This shift value specifies how far each letter in the plaintext is shifted
in the alphabet. For example, if the shift value is 3, each letter in the plaintext will be shifted
down the alphabet three positions.
2. Encrypting a Message: To encrypt a message using the Caesar Cipher, you shift each letter in
the plaintext according to the shift value you specify. Here's an easy example using a shift value
of 3:
Encryption Method:
As a result, "HELLO" encrypted with a Caesar Cipher with a shift value of 3 becomes "KHOOB.
Decryption Method:
As a result, "KHOOB" decoded with a Caesar Cipher and a shift value of 3 produces "HELLO."
It's crucial to note that the Caesar Cipher is a fairly simple and easily broken encryption scheme,
with just 25 potential shift values (excluding the no-shift case), making it vulnerable to brute force
attacks. For securing sensitive information, more advanced encryption approaches, such as the
use of contemporary cryptographic algorithms, are recommended.