0% found this document useful (0 votes)
76 views5 pages

TUT104 - Assignment 05 Memorandum

This document provides information on an assignment for an information security course. It contains a memorandum for Assignment 05 with questions on public/private key encryption and cipher techniques. It also includes a sample dataset with sensitive personal information and questions about direct and indirect attacks to derive information from the dataset. The key points are that the document provides assignment details, encryption questions, and a privacy/attack scenario for students to analyze.

Uploaded by

ruwaine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views5 pages

TUT104 - Assignment 05 Memorandum

This document provides information on an assignment for an information security course. It contains a memorandum for Assignment 05 with questions on public/private key encryption and cipher techniques. It also includes a sample dataset with sensitive personal information and questions about direct and indirect attacks to derive information from the dataset. The key points are that the document provides assignment details, encryption questions, and a privacy/attack scenario for students to analyze.

Uploaded by

ruwaine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

INF4831/104/2023

Tutorial Letter 104/0/2023

INFORMATION SECURITY
INF4831

Year module

School of Computing

IMPORTANT INFORMATION

Please register on myUnisa, activate your myLife e-mail account and make sure that
you have regular access to the myUnisa module website, INF4831-23-Y, as well as
your group website.

Note: This is a fully online module and therefore it is only available on myUnisa.

1
INF4831/104/2023

CONTENTS
Page

Assignment 05 memorandum ................................................................................................................. 3

2
INF4831/104/2023

Assignment 05 memorandum
1. A financial advisor, Mr X, wants to send a protected trading document to his client, Mr Y.
Mr X wants to ensure that only Mr Y can open the protected trading document and no one else, thus ensuring
confidentiality through the use of PKI. Which key would Mr X use to send the protected trading document to Mr
Y? (2)

Answer:

a) Mr Y’s public key (Correct)


b) Mr Y’s private key
c) Mr Xs public key
d) Mr Xs private key

2. Mr X wants to ensure authenticity when sending the protected trading document to Mr Y. Which key would
Mr X use? (2)

Answer:

a) Mr Y’s public key


b) Mr Y’s private key
c) Mr Xs public key
d) Mr Xs private key (Correct)

3. Consider the following plain text message:

FOUR PM AT SMITH STR

Encrypt the plain text message above using the two techniques as required by (a) and (b) respectively, one after
the other:
a) Use a Caesar Cipher with a shift of THREE, and then, (2 marks)
b) encrypt the resulting ciphertext using a FOUR-column columnar transposition cipher (2 marks)

Note that you must perform the Caesar Cipher on the message, then the columnar transposition on the cipher
text that is produced from the operation of the Caesar Cipher.

3
INF4831/104/2023

Answer

Plain a b c d e f g h i j k l m n o p q r s t u v w x y z
text
Shift d e f g h i j k l m n o p q r s t u v w x y z a b c
of 3

Plain F O U R P M A T S M I T H S T R E E T
text
Cipher i r x u s p d w v p l w k v w u h h w
text
(2 marks)

Four columns

i r x u
s p d w
v p l w
k v w u
h h w x
(2 marks)

Cipher text (Write from top of columns)

2.1 The Caesar Cipher with a shift of THREE is: (Select the correct answer and write down only the question
number the alphabetic letter as your answer.) (2)

a. FOURPMATSMITHSTREET
b. whhuw vkwlpvwpsuxri
c. irxuspdwvplwkv wuhhw (CORRECT)
d. irxuspdwvplwkvwuhhw (CORRECT)

2.2 The final cipher text (derived from 2.1) and then applying FOUR-column columnar transposition cipher is:
(Select the correct answer and write down only the question number the alphabetic letter as your answer.)
(2)

a. irxuspdwvplwkvwuhhwx
b. irxuspdwvplwkvwuhhw
c. whhuwvkwlpvwdpsuxri
d. isvkhrppvhzdlwwuwwux (C0RRECT)

4
INF4831/104/2023

QUESTION 3

Use table 1 to answer the following questions:

Table 1

FLX_ID FLX_Name FLX_Gender FLX_City FLX_TB FLX_Financial FLX_Period


Status Aid
0001 Charles M Cape Town Positive 2000 2
0002 Thabo M Cape Town Positive 2000 2
0003 Jane F Pretoria Negative 0 0
0004 Felix M Pretoria Positive 0 3
0005 Mary F Pretoria Positive 6000 2

A direct and indirect attack can be applied to derive sensitive information from table 1. Which one of the
following statements is correct? (2)

a. A direct attack (List FLX_Name where FLX_Gender = F and FLX_TB_Status = Positive)


could reveal that Mary, a female, is positive for TB. (CORRECT)

b. An indirect attack using SUM could reveal that individuals in Pretoria are receiving the least financial aid.
{They are receiving the most aid}

c. An indirect attack (List FLX_Name where FLX_Gender = F and FLX_TB_Status = Positive)


could reveal that Mary, a female, is positive for TB {This is a direct attack}

d. An indirect attack using AVE could reveal that individuals in Pretoria are receiving no financial aid. {It will
reveal that individuals are receiving aid}

QUESTION 4

Five IEEE certificates. (50)

Total 60 marks

©
Unisa 2023

You might also like