You are on page 1of 4

Assignment No.

02 Total Marks: 20
Semester: Fall 2017 Due Date
Abubakar Siddique
th
18 of Jan, 2018
Student ID: BC140400374
Information Security – CS205

Scenario
Suppose we have encrypted a plaintext using transportation block cipher
method. We have used three keys K1, K2 and K3 which are of 8, 16 and 8
bits respectively and having followed key pattern:

Key Patterns
Key Pattern 1 (K1)
1↦2, 2↦8, 3↦5, 4↦7, 5↦3, 6↦4, 7↦1, 8↦6
Key Pattern 2 (K2)
1↦3, 2↦10, 3↦8, 4↦12, 5↦7, 6↦13, 7↦2, 8↦16, 9↦15, 10↦11, 11↦5,
12↦14, 13↦1, 14↦6, 15↦9, 16↦4
Key Pattern 3 (K3)
1↦4, 2↦7, 3↦3, 4↦1, 5↦8, 6↦2, 7↦5, 8↦6

First, you should have encrypted their plain text using Key K1, then the
result (obtained cipher text through K2 encryption) is encrypted again by
Key K2 and at the end we have Encrypted the Ciphertext again using K3.

Encrypted Encrypted Encrypted Final


Plaintex With K1 With K3 Cipher
With K2
t text

Final Cipher Text


chwIuin jnayse“t triaeh eraste cyroui jveesett-nihe eMrrat. w”K.rLh unt
gJei r

Question Statement
You have to convert Final Cipher Text back to Plain Text by decrypting it
using Keys.
BEST OF LUCK

Answer: to Decrypt
I am going to follow the inverse ke pattern to decrypt the plain text. First
using key 3 then key 2 and finaly 1

Decryption: for decryption I am going to inverse the


keys .

Inversed Key Pattern 1 for decryption (K1)


2↦1, 8↦2, 5↦3, 7↦4, 3↦5, 4↦6, 1↦7, 6↦8
Key Pattern 2 decryption (K2)
3↦1, 10↦2, 8↦3, 12↦4, 7↦5, 13↦6, 2↦7, 16↦8,15↦9, 11↦10, 5↦11,
14↦12, 1↦13, 6↦14, 9↦15, 4↦16
Key Pattern 3 decryption (K3)
4↦1, 7↦2, 3↦3, 1↦4, 8↦5, 2↦6, 5↦7, 6↦8

Performing decryption using Keys 3

Key Pattern 3 decryption (K3)


4↦1, 7↦2, 3↦3, 1↦4, 8↦5, 2↦6, 5↦7, 6↦8

( I am going to use (_) as spaces between text.


chwIuin jnayse“t triaeh eraste cyroui jveesett-nihe eMrrat. w”K.rLh unt
gJei r

87654321 87654321 876543 21 87654321 87654321 87654321


chwIu i n_ j nays e“ t __ t r i aeh _er as te_ c y rou i __
j vees et t
wLn c_ i hu a y“ j t ens t r e_ ha_ I r ae__t es r o_ c _I yu
e et j t evs
87654321 87654321 87654321 87654321
- n ihe _em r r at ._w” k . rLh _un t_ g j e i_ r
I h e-m_he a t wr“_r . r L ukn _. h gj _ t r I _ e

Cipher text after decrypting using key 3


winc Ihuay“jtenstre ha Irae tesro c Iyueetj tevsihe-m heatwr“ r.rLukn .hgj
trI e

win c_ I hu a y“ j t ens t r e_ ha_ i r ae__t es r o


_ c _ I y u e e t Key
j t ePattern
v s i h2 edecryption
- m _ h e (K2)
a t wr“_r . r L u
kn _. h gj _ t r I _ e
3↦1, 10↦2, 8↦3, 12↦4, 7↦5, 13↦6, 2↦7, 16↦8,15↦9, 11↦10, 5↦11, 14↦12,
1↦13, 6↦14, 9↦15, 4↦16

16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
w I n c _ i h u a y“j t ens t r e _ h a _ i r
ae__tes
t u “ s n j i I wncy_ ahe _ i e s e _ a r t
e _ahr_t

16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
r o _ c _ i y u e et j t evs i h e - m _ h e a
twr “_r .
t u t s _ j i o r v ce_e ye “ e w . e r _ h i
r - t mah_

16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
r L u k n _ . h g j _t r i_e
r h _ e u t _ L r _ k j ng. i

Result after using Key 2

t u “ s n j i i wncy_ ahe _ i e s e _ a r t
e _ahr_t Inversed Key Pattern 1 for decryption (K1)
t 9 t s _ j i o r v ce_e ye “ e w . e r _ h
i r - t ma h_ 2↦1, 8↦2, 5↦3, 7↦4, 3↦5, 4↦6, 1↦7, 6↦8
r h _ e u t _ L r _ k j ng. i

87654321 87654321 876543 21 87654321 87654321 87654321


t u“ snj i I wncy_ ahe _ i es e_ a r t e _ahr_ t t 9t s _ j
io r v ce_eye
“ In j us ti c e_anywh er e_ i s _ a _ t hr eat _ t o_ j us
ti c e _every

87654321 87654321 87654321 87654321


“ew. er _h i r - t man_ r h_eut _L r_k j ng. i
Final Answer

After Decrypting further the final message in plain text is below

“Injustice anywhere is a threat to justice everywhere.“- Martin Luther


king Jr .

You might also like