Kaplan University
IT286
Unit 6
Jennifer Polisano
Question 6-1: Write a one half page description of the use of substitution ciphers and transposition ciphers. Use the rot13 encoding algorithm to encode the following sentence: It is critical for network administrators to understand cryptography.
There are several websites that will encrypt in rot13.
Answer 6-1: Substitution ciphers are a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth (WordNik, 2014). In other words, if you’re sending a message (plaintext) you want to keep secret, it can be transformed into an enciphered message (cipertext) using a different alphabet. The person receiving the message will then have to decrypt it. Transposition cipers are simple data encryption schemes in which plaintext characters are shifted in some regular pattern to form ciphertext (Gustavus, 2014). In other words, it’s a simpler way to send secret messages; however, it isn’t as secure and can be decrypted easily. For an example, I have encrypted the following phrase using rot13 encryption: “It is critical for network administrators to understand cryptography.” I was returned with: “Vg vf pevgvpny sbe argjbex nqzvavfgengbef gb haqrefgnaq pelcgbtencul”.
Question 6-2: Write a paragraph on each one of the following
Hi Class, the assignment 2 will be a group assignment by due 3/12, 11:59pm. You write your own reflection (450 words) as your writing sample and combine it with the html tag that we have learned in the class.
These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below.
Encryption technique is the translation of data into a secret code that will prevent hackers or identity thieves from being able to break or read the data that is sent across the network.
The data for Exercises 6 and 7 are in the data file named Lesson 20 Exercise File 1. Answer Exercises 6 and 7 based on the following
Refer as needed to material in Chapters 12 and 13. Read the instructions carefully and answer all questions clearly and concisely. Include examples to highlight your comments.
Upload completed assignment here. Copy and paste each question into a Word document and respond beneath each question in full sentences. Answer each question in your own words (do not copy and paste). Provide the page number on which the information is found. Save the document as first name, last initial_scavengerhunt. Example:
* Please be sure to review your Turnitin score before submitting the draft to your instructor.
When a fellow general received the message, he would wrap the paper around his corresponding scytale to decipher the message (Tyson 2014). Since the advent of computers though, encryption has become increasing important and relies almost solely on cryptographic means to secure information. When speaking about encryption today, it refers more to the process rather than the mathematical formulas used to scramble data. The basic idea behind encrypting a computer message is such that it is scrambled with a sequence of random bits, known as a key, and only parties with the corresponding key can transpose it back into a comprehensible format. These keys are created via a cipher, otherwise known as an algorithm. When a user sends a message, known as the plaintext, across a network, the computer applies an algorithm to the information to encode it, resulting in a ciphertext (Encryption Basics 2014). This method can be best summarized visually:
After reading the course resources, answer questions 1-10. (10 points each) Please take time to answer each question completely.
Directions: Respond to the prompts below (no more than 1 single-spaced page in Arial 11-point font) by typing your responses within the brackets following each prompt. Do not delete or alter any original text on this form (including the header, footer, title, directions, and prompts); both the original text and your responses are included in the total page count allowed. Pages exceeding the maximum will not be scored.
2.) Answer the following questions based on a reading of the above document and material from your textbook.
Please use the textbook, the PPT lecture handout of Chapter 1, and internet to answer the following six questions:
Encryption is a method of converting plain text to cipher text using some base keys and
There are weak encryption and strong encryption. Caesars method is known as weak encryption because it can be deciphered. Deciphering a code without authorization is known as “cracking” a code. In order to crack the simple substitution code, you could make twenty-five different transformation tales where each of them has a different offset. Strong encryption, the opposite of weak encryption, is very tough to crack. By using expensive, specialized, code-breaking computers, strong encryptions methods can be broken. Also, encryption methods can be broken by the use of supercomputers, mainframe computers, workstations and personal computers. The codes can be broken using these computers by using the brute-force method, which consists of trying all of the possible keys (Parsons 329).
Answer the “Questions for Discussion” using the book, your knowledge and ideas and class material.