Cryptography, Security and Encryption bibliography

Netiva Caftori
CS-355

NEIU

I hope we'll learn from each other
It is not very secure. I hear and I forget. I see and I remember. I do and I understand Chinese Proverb

Please send me an email so I add you to the class list. Thanks...

First assignments:

  1. Create a Spartan scytale cipher (transposition cipher).
  2. Count how many a's, b's etc. there are in a paragraph of your choice. Calculate the percentage of each.
  3. Repeat above with the most common digrams as on p. 205.
  4. Make your own Vigenere square.
    If the key is axyzbt what is hlv zsx yls spwav?
  5. Encrypt your own message through the Vigenere with same key.
  6. On the one-time pad use the key 6,2,21,14,7,8,12,9 to encrypt the word welcome.
    Decrypt/encrypt your neighbor's word.
    See example
  7. Decrypt: tHIs cOUrse ShoUld bE easy dOnT you ThiNK sTudNT using Sir Francis Bacon Steganography.
    Add Bacon's Bilateral Cipher to your cheat sheet.

Assignments:

  • Review Chapter 5 for the 1st few assignments.
  • Review terminology
  • Review history of cryptography and cryptanalysis
  • Team project: Select a chapter from our book (1-4 or 9-11) and divide it among your team. Read your part and practice with the others on how to present it. You may consult with me.
    Each student will be required to evaluate each presentation:
    Criteria for evaluation could be on:
    Physical: Appearance, eye-contact, gestures, diction
    Content: Objectives outlined, thoroughness, clarity, concisiveness, etc.
  • Individual project: Search the net or continue along the line of your team topic. Present to the class on a preassigned date. Let me know when is a good time for you. This should happen in the last 3 weeks of the semester.
  • and more

  • Some sources

    Sorry for this joke

    More assignments

    1. Decipher that 1st code by our author Simon Singh. I'll give you a copy if you don't have the Code book yet (p. 353).
    2. Decrypt also the Cesaer cipher on p. 354. Work with your team to divide the alphabet among you so you don't have to check all 26 shifts.
    3. Also if you have the Code book you can decrypt the following: 39 70 31 35 05 27 12 10 29 32 41 09 according to the homophonic substitution cipher on page 53.
      Also write a message for your neighbor to decrypt in class.
    4. Using exclusive or symmetric cypher with key 01010101 and the ASCII table as in http://www.neurophys.wisc.edu/comp/docs/ascii.html encrypt HELLO and decrypt: DC4 ETB SYN
    5. Find the prime factorization of n=4,710,399.
      You may want to write a program and use the list of primes at the end of our book.

    Example of One-time pad


    D -I - N - O - S - A - U - R - the plaintext
    4 -9 -14 -15 -19 - 1 -21 -18 - translation into numbers
    6 -2 -21 -14 - 7 - 8 -12 - 9 - the key (chosen arbitrarily)
    _ __ ___ ___ ___ ___ ___ ___ - adding them up:
    10,11, 35, 29, 26 , 9, 33, 27 - now modulo 26:
    10,11 , 9 , 3, 26 , 9 , 7 , 1
    J, K , I , C , Z , I , G , A - translated back into the alphabet

    because:
    35 MOD 26 = 9 and 33 mod 26 = 7 etc.

    Return to Dr. Caftori's

    Thanks for visiting here!

    ~~~Your comments are appreciated.

    Last updated 4/17/07