Вы находитесь на странице: 1из 3

TUTORIAL 1

1. Explain briefly these terms: a. Cryptography, Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as they do for decryption. Other names for this type of encryption are secret -key, shared-key, and private-key. The encryption key can be loosely related to the decryption key; it does not necessarily need to be an exact copy. b. Cipher A cipher (or cypher) is an algorithm for performing encryption or decryption a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. In non-technical usage, a cipher is the same thing as a code; however, the concepts are distinct in cryptography. In classical cryptography, ciphers were distinguished from codes. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, UQJHSE could be the code for Proceed to the following coordinates. When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it should resemble random gibberish to those not intended to read it. c. Code, A code is a rule for converting a piece of information (for example, a letter,word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. One reason for coding is to enable communication in places where ordinary spoken or written language is difficult or impossible. For example, semaphore, where the configuration of flags held signaller or the arms of a semaphore tower encodes parts of the message, typically individual letters a nd numbers. Another person standing a great distance away can interpret the fla gs and reproduce the words sent.

d. Encryption ,Encryption refers to algorithmic schemes that encode plain text into nonreadable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. Web browsers will encrypt text automatically when connected to a secure server, evidenced by an address beginning with https. The server decrypts the text upon its arrival, but as the information travels between computers, interception of the tran smission will not be fruitful to anyone "listening in." They would only see unreadable gibberish.There are many types of encryption and not all of it is reliable. The same computer power that yeilds strong encryption can be used to break weak encryption schemes. Initially, 64-bit encryption was thought to be quite strong, but today 128 -bit encryption is the standard, and this will undoubtedly change again in the future. e. Decryption. Encryption and decryption refer to the password -based conversion of electronic information or data into what is known as a ciphertext or a form that makes it extremely difficult to read, and to the return of the same data back to its original form which might be plain text. Ciphertext is what results from data being "passed through" or processed by ciphers that might simply sub stitute letters of an alphabet with numbers or totally manipulate the arrangement of the data via algorithms. Sometimes the rearranged data is called codetext, but "code" is the simple representation of signals, whether that representation is kept secret or not. Morse code is one example that could be called a code but not a ciphertext. The process of converting data back to its original form ideally is achieved using a key, commonly known as a password, but highly sophisticated software also can be employed to discover the key or analyze the data to return it to its original form whether, that was plain text or audio. There are many reasons for the use of encryption and decryption, such as securing the sensitive data that is transmitted to complete electronic transactions such as online purchases of merchandise or services and for interaction with government agencies requiring the submission of private information. When a consumer purchases a product or service from a business that conducts electronic commerce, simply known as e-commerce, he or she enters his or her billing addre ss and credit card details into an online form in order to send this data to be processed. Encryption and decryption always should be at work in such situations to protect the purchaser's financial information.

2. In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to regular system. The units of plaintext are retained in the same sequence in the ciphertext , but the units themselves are altered. Give two examples and illustrate them in a table as shown below: Plaintext saya cantik Key number Chiphertext - 221281 311723914 Plaintext ida bijak Key number Chiphertext- 941 2910114 3. Caesar cipher is a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps as shown below: A B C D E F G H I J K L M

a. Find ciphertext for HELLO. URYYB b. Write your name with the ROT13 above. NVZVR FUNSVMN 4. In transposition cipher, the units of the plaintext is rearranged in a different and usually quite complex order, but units themselves are left unchanged. Reverser and flipper are among the technique fall under this category. a. Find ciphertext for MTE3114 with the reverser and flipper technique respectively. b. Find ciphertext for IPGSULTANMIZAN with each technique. VCTFHYGNZVMNA

Вам также может понравиться