logo

Crowdly

Browser

Add to Chrome

CMP5385 Applied Cryptography A S1 2025/6

Looking for CMP5385 Applied Cryptography A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5385 Applied Cryptography A S1 2025/6 at moodle.bcu.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Slack encrypts messages between clients and servers.

Which type of attack does this prevent?

View this question

Define "Confidentiality".

View this question

In this exercise we consider the Simple Substitution Cipher as a 5-bit block cipher. The letters A = 1, B = 2, C = 3…..Z = 26 are first represented as binary strings (5 bits per letter) as follows: A = 00001, B = 00010, C = 00011, …Z= 11010. Let the key of a Simple Substitution Cipher be given by (plaintext in top row above is replaced by bold ciphertext in bottom row):

(a)  Write the plaintext TODAY as a binary string. 

View this question

Change the second bit in each block of the above ciphertext and then decrypt this altered ciphertext.

View this question

Encrypt TODAY using the above cryptosystem and write the ciphertext as a binary string.

View this question

How many bits of the resulting plaintext are incorrect?

Hint: Convert the plaintext into bit form like you did in Part A and compare with your answer for part A

View this question

In this exercise we consider the Simple Substitution Cipher as a 5-bit block cipher. The letters A = 1, B = 2, C = 3…..Z = 26 are first represented as binary strings (5 bits per letter) as follows: A = 00001, B = 00010, C = 00011, …Z= 11010. Let the key of a Simple Substitution Cipher be given by (plaintext in top row above is replaced by bold ciphertext in bottom row):

(a)  Write the plaintext TODAY as a binary string. 

View this question

In Python or another language of your choice, implement a brute force attack.

  • Allow a user to enter a 5-character, uppercase only, password of their choosing
  • Write a script which generates all possible 5-character, uppercase only passwords
  • Show that you've been able to find the user-inputted password.

Save this script as you'll need it in future weeks. Upload the script here.

Extension: Can you do the same for a password containing letters and numbers? What about if you were to include special characters? What do you notice about run time of your script with these differing password structures?

View this question

You know that Frequency Analysis can be used to break monoalphabetic ciphers, but it has it's flaws. What approaches could be used to make frequency analysis ineffective?

View this question

Explain how you might adjust the normal English letter frequencies shown in the lecture slides in order to conduct single letter frequency analysis, given that the context of a plaintext is a letter in French.

View this question

Want instant access to all verified answers on moodle.bcu.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome