Professional Documents
Culture Documents
02 Total Marks: 20
Semester: Fall 2017 Due Date
Abubakar Siddique
th
18 of Jan, 2018
Student ID: BC140400374
Information Security – CS205
Scenario
Suppose we have encrypted a plaintext using transportation block cipher
method. We have used three keys K1, K2 and K3 which are of 8, 16 and 8
bits respectively and having followed key pattern:
Key Patterns
Key Pattern 1 (K1)
1↦2, 2↦8, 3↦5, 4↦7, 5↦3, 6↦4, 7↦1, 8↦6
Key Pattern 2 (K2)
1↦3, 2↦10, 3↦8, 4↦12, 5↦7, 6↦13, 7↦2, 8↦16, 9↦15, 10↦11, 11↦5,
12↦14, 13↦1, 14↦6, 15↦9, 16↦4
Key Pattern 3 (K3)
1↦4, 2↦7, 3↦3, 4↦1, 5↦8, 6↦2, 7↦5, 8↦6
First, you should have encrypted their plain text using Key K1, then the
result (obtained cipher text through K2 encryption) is encrypted again by
Key K2 and at the end we have Encrypted the Ciphertext again using K3.
Question Statement
You have to convert Final Cipher Text back to Plain Text by decrypting it
using Keys.
BEST OF LUCK
Answer: to Decrypt
I am going to follow the inverse ke pattern to decrypt the plain text. First
using key 3 then key 2 and finaly 1
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
w I n c _ i h u a y“j t ens t r e _ h a _ i r
ae__tes
t u “ s n j i I wncy_ ahe _ i e s e _ a r t
e _ahr_t
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
r o _ c _ i y u e et j t evs i h e - m _ h e a
twr “_r .
t u t s _ j i o r v ce_e ye “ e w . e r _ h i
r - t mah_
16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
r L u k n _ . h g j _t r i_e
r h _ e u t _ L r _ k j ng. i
t u “ s n j i i wncy_ ahe _ i e s e _ a r t
e _ahr_t Inversed Key Pattern 1 for decryption (K1)
t 9 t s _ j i o r v ce_e ye “ e w . e r _ h
i r - t ma h_ 2↦1, 8↦2, 5↦3, 7↦4, 3↦5, 4↦6, 1↦7, 6↦8
r h _ e u t _ L r _ k j ng. i