Cryptography and Network Security": Sir Syed University of Engineering & Technology
Cryptography and Network Security": Sir Syed University of Engineering & Technology
TECHNOLOGY
(Assignment#01)
Submitted By
“Samra Shafiq”
“Ce-2018-083”
1
Student ID__Ce-18-083____ Section _B______ Name ___Samrah Shafiq_____
Question#01: CLO_1
Consider a medical report access system in which patients provide a reference number/username and
password (e.g., Agha Khan Laboratory etc.) to access their reports online. Give examples of
confidentiality, integrity, authenticity, and availability requirements associated with the system and, in
each case indicate the degree of the importance of the requirement.
Answer:-
Example of Confidentiality: -
The example of medical report access system of confidentiality is confidentiality is maintained for a
computer file if authorized users of agha khan laboratory can access their report online, while
unauthorized persons are blocked from accessing it. However, confidentiality associated with the system,
and it is very important factor that only authorized users have a access of report. And all unauthorized
person will be block.
Example of Integrity: -
The example of integrity for agha khan laboratory to access the medical report system online is integrity
means that data of laboratory is protected from unauthorized changes to ensure that it is reliable and
correct. If a data is changed by a third person (with no right on it), a data breach can be easily provoked.
Through integrity, data of report must be trustworthy. Its main objective is to make sure that a data will
stay undamaged it’s all life cycle and will be the same wherever it can be not to cause any disturbance to
information
Example of availability: -
2
Availability guarantees that online report systems, applications, and data are available to users when they
need them. The most common attack that impacts availability is denial-of-service in which the attacker
interrupts access to information, system, devices, or other network resources. Availability
means guaranteeing reliable access to information by authorized personnel. To be readily accessible, data
must be stored in a logical yet secure system. High availability aids rapid business processing and
ultimately benefits the organization like agha khan laboratory for the access of online report system.
Example Of Authenticity:
The example of authenticity in the medical report in which provides username and password the
Authentication technology provides access control for username or password by checking to see if a user's
credentials match the credentials in a database of authorized users or in a data authentication server. So,
the authenticity is very important for securing credential information like patient username or password
while to access the medical report system online.
Question#02(a):
Complete the following table with the help of “Ceasar Cipher”? CLO_2
3
Question#02(b): Complete the following table with the help of “Polyalphabetic Ciphers: The Vigenere
Cipher”?
L=11
(SamrahL,11=L)
Fill table1 for M1, M2, and M3, (a) M1 starts with your first name, (b) M2 with your last name and, (c)
M3 should start with your full name
Table 1:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
M1 S A M R A
M2 S H A F I Q
M3 S A M R A H S H A F I Q
4
Table 2:
NEWZEALANDCAPTAINWONTHETOSSANDELE
CTEDTOBAT
VSZWSVLUCTMBWSVQQDGOHXNFGVN