Tutorial on Cybersecurity basics
Tutorial on Cybersecurity basics
Answer:
Atbash cipher: A -> Z, B -> Y, C -> X, ..., Z -> A
Encrypted Text: "SVOOL DLIOW"
Answer:
Encrypted Text: "XJHWZJ"
3. Decrypt the ciphertext "KHOOR" encrypted using a Caesar cipher with a shift of 3.
Answer:
Decrypted Text: "HELLO"
4. Construct a Playfair matrix with the key cryptography. Make a reasonable assumption
about how to treat redundant letters in the key.
Answer:
C R Y P T
O G A H B
D E F I K
L M N Q S
U V W X Z
Assume a Monoalphabetic substitution and suggest possible plaintext for the ciphertext.
1
Answer:
To decrypt the ciphertext "ZEBBW XYCQB ZEBBW" using frequency analysis, we assume that
the frequency of letters in the ciphertext corresponds to the relative frequency of letters in
English. Here’s the step-by-step process:
The most frequent letter in English is E. Since Z is the most frequent letter in the ciphertext
(20%), we map Z to E.
For the second most frequent letters (E and B, each 15%), we compare their context in the
ciphertext and map them to commonly used letters in English, such as T or A.
3. Substitution Hypothesis
Z→E
E→T
B→A
W→R
X→H
Y→I
C→S
Q→O
Using the mapping, the ciphertext "ZEBBW XYCQB ZEBBW" decrypts as:
"EARAR HISOS EARAR".
"EARAR HISOS EARAR" can be refined to make sense in English. Based on patterns, this
could represent:
"EAGER HOUSE EAGER"
(assuming slight adjustments for readability).
2
7. Assuming Vigenère cipher, show how the text ‘WE ARE DISCOVERED SAVE
YOURSELF’ will be encrypted. Consider the key to be “DECEPTIVE”.
Answer:
Answer to 5:
3
The Playfair Cipher Encryption Algorithm:
The Algorithm consists of 2 steps:
Generate the key Square(5×5):
The key square is a 5×5 grid of alphabets that acts as the key
for encrypting the plaintext. Each of the 25 alphabets must be
unique and one letter of the alphabet (usually J) is omitted
from the table (as the table can hold only 25 alphabets). If the
plaintext contains J, then it is replaced by I.
PlainText: "instruments"
After Split: 'in' 'st' 'ru' 'me' 'nt' 'sz'
1. Pair cannot be made with same letter. Break the letter in single
and add a bogus letter to the previous letter.
Plain Text: “hello”
After Split: ‘he’ ‘lx’ ‘lo’
Here ‘x’ is the bogus letter.
Diagraph: "me"
Encrypted Text: cl
Encryption:
m -> c
e -> l
If both the letters are in the same row: Take the letter to the
right of each one (going back to the leftmost if at the rightmost
position).
For example:
Diagraph: "st"
Encrypted Text: tl
Encryption:
s -> t
t -> l
5
n -> r
t -> q
For example:
Plain Text: "instrumentsz"
Encrypted Text: gatlmzclrqtx
Encryption:
i -> g
n -> a
s -> t
t -> l
r -> m
u -> z
m -> c
e -> l
n -> r
t -> q
s -> t
z -> x
6
7