0% found this document useful (0 votes)
19 views

Symmetric Encryption Review Questions

Doc

Uploaded by

mwaijegakelvin9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Symmetric Encryption Review Questions

Doc

Uploaded by

mwaijegakelvin9
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

REVIEW QUESTIONS AND SOLUTIONS FOR VARIOUS SYMMETRIC

ENCRYPTION ALGORITHMS

QN1: Using the matrix (m*n) = (6*5), decrypt the following cipher-text phrase
“SIVMABETEPNJCYROTEUIYRSCRSITUT” into plain text

Solution

S E C U R
I T Y I S
V E R Y I
M P O R T
A N T S U
B J E C T

SECURITY IS VERY IMPORTANT SUBJECT

QN2: Using Rail fence transposition algorithm, encrypt the phrase “INSTITUTE OF
ACCOUNTANCY ARUSHA GRADUATES” with the key = 5.

Solution

Cipher-text: IENUU NTOUTRSOA SUFOAAHAT TTUCNYARE ICCGS

QN3: Using the Vigenère Cipher table, encrypt the following plaintext phrase “WE ARE
DISCOVERED SAVE YOURSELF”. Use the keyword “deceptive”
VIGENĔRE TABLEAU

Solution

Step 1
Write the plaintext as:
wearediscoveredsaveyourself
Since this message has a length of 27, it needs a key as long as 27 letters.
Step 2
Repeat the given keyword “deceptive” three times to obtain the following key:

deceptive deceptive deceptive


Step 3

Use this key and the Vigenĕre Tableau to encrypt the original plaintext into:
ZICVTWQNGRZGVTWAVZHCQYGLMGJ
QN4: The Vernam cipher uses English alphabet letters, whereby A to Z are given values from 01 to 26
respectively. Encrypt the phrase SECURITYISEVERYTHING using a key word TECHNOLOGY.

Answer:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Plaintext S E C U R I T Y I S E V E R Y T H I N G

Key T E C H N O L O G Y T E C H N O L O G Y

Plaintext 19 5 3 21 18 9 20 25 9 19 5 22 5 18 25 20 8 9 14 7

Key 20 5 3 8 14 15 12 15 7 25 20 5 3 8 14 15 12 15 7 25

TOTAL 39 10 6 29 32 24 32 40 16 44 25 27 8 26 39 35 20 24 21 32

Modulo 26 13 10 6 3 6 24 6 14 16 18 25 1 8 26 13 9 20 24 21 6

CIPHER M J F C F X F N P R Y A H Z M I T X U F

QN5: Using the XOR method, find the cipher of the following plaintext of bits
011100000110010110000000, whereby 10000101 used as a key.

Answer:

XOR logic table

Input Input Output


1 2
1 1 0
1 0 1
0 1 1
0 0 0
Plaintext 0 1 1 1 0 0 0 0 0 1 1 0 0 1 0 1 1 0 0 0 0 0 0 0

Key 1 0 0 0 0 1 0 1 1 0 0 0 0 1 0 1 1 0 0 0 0 1 0 1

Ciphertext 1 1 1 1 0 1 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 0 1

QN6: Given the ciphertext phrase [ ITFUCSNUANYHSTCTAATECARXIOONUX] from the


transposition cipher method, find the plaintext.

Solution

I T F U C S
N U A N Y H
S T C T A A
T E C A R X
I O O N U X

INSTITUTE OF ACOUNTANCY ARUSHA

QN7: Using playfair cipher method, encrypt the phrase “The Institute of Accountancy Arusha
Graduation” using the keyword “Friday”
Playfair table

F R I D A

Y B C E G

H K L M N

O P Q S T

U V W X Z

Plaintext: IN ST IT UT EO FA CX CO UN TA NC YA RU SH AG RA DU AT EX

Cipher-text: AL TO AQ ZO YS RF EW YQ ZH ZG LG GF FV OM GN IF FX GZ MD

QN8: Using the playfair cypher method encrypt the phrase “INFORMATION SECURITY” with the
keyword “MASTER”

Playfair Table

M A S T E
R B C D F
G H I/J K L
N O P Q U
V W X Y Z

IN FO RM AT IO NS EC UR IT YX
GP BU GR SE HP PM SF NF KS ZY

You might also like