CHUKA UNIVERSITY
COSC 464:CRYPTOGRAPHY AND COMPUTER SECURITY
Assignment/CAT1
Task1:
Given Key: 1 3 4 7 5 6 2, using Rail fence cipher to encrypt the message “The Grenade is ready”
Task 2:
Use the expression E(x) =(8x +3) MOD 26 to encrypt the message “The attack is over"
Task 3:
Using RSA,show how two users can encrypt a message M givenp=3;q=5,e=3;M=HI
(i)Determine the value of n
(ii)Determine f(n)
(iii)Determine Public Key
(iv)Determine Private Key
(v)Encrypt“M”
Task 4:
Using Diffie-Hellman and given p=7and g=3
[Link] a secret key for both Alice and Bob
[Link] public key for both Alice and Bob
[Link] the common session key to be used by both alice and Bob to encrypt messages
Task 5: (Computer Science students only)
You are currently working on a fourth year project where you are required to do Security Design as a
component of system design. Use your fourth year project to do the following:
(a)With justifications, identify the security controls you will incorporate in your project design. Give your
justifications/rationale based on the need to achieve the following security objectives.
[Link] of system captured or generated data
[Link] of system captured or generated data
[Link] of the system when legitimate users need to use it.