1240 Words5 Pages

Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why?
I personal like all the ways that I saw in the above list. I think that a cryptanalyst would likely to use the Histogram. I personally think it is easier to read and the information that it gives is very valuable. It gives you the frequency and percent on how many times a certain character was used. Which if I think if I was a cryptanalyst this may help me out in deciphering the encrypted text.
Q2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case?
I*…show more content…*

Q6. What difference do you notice in the block size, discuss whether or not this cipher would be susceptible to statistical analysis and why? I can see the difference of the block size and it is advent that one may be more susceptible to statistical analysis than the other. I think when you use the smaller key it is more susceptible to statistical analysis and if you use the larger one it isn’t or a lot more difficult to be able to get statistical data on it and here is why. If you look at p and q with the smaller values you can see the the block size is reduced while the amount of blocks or the number is increased. When we compare the other p and q with the larger values we can see that the block size is increased and the number of blocked is decreased. Q7. Analyze the data encrypted with the RSA cipher. How does this encryption method compare to the other methods the Lab has covered? I actually use this type of encryption for work. I have an RSA device on my computer as well as on my key ring. What I have noticed is that histogram seems to be a little bit more difficult to decipher as well as the entropy. When I look at my result it seems to be random and very made up. It doesn’t hold to a pattern and very hard to crack. So I think it is fair to say that it would be almost impossible to be susceptible to statistical analysis by

Q6. What difference do you notice in the block size, discuss whether or not this cipher would be susceptible to statistical analysis and why? I can see the difference of the block size and it is advent that one may be more susceptible to statistical analysis than the other. I think when you use the smaller key it is more susceptible to statistical analysis and if you use the larger one it isn’t or a lot more difficult to be able to get statistical data on it and here is why. If you look at p and q with the smaller values you can see the the block size is reduced while the amount of blocks or the number is increased. When we compare the other p and q with the larger values we can see that the block size is increased and the number of blocked is decreased. Q7. Analyze the data encrypted with the RSA cipher. How does this encryption method compare to the other methods the Lab has covered? I actually use this type of encryption for work. I have an RSA device on my computer as well as on my key ring. What I have noticed is that histogram seems to be a little bit more difficult to decipher as well as the entropy. When I look at my result it seems to be random and very made up. It doesn’t hold to a pattern and very hard to crack. So I think it is fair to say that it would be almost impossible to be susceptible to statistical analysis by

Related

## Csec 630 Lab 1

1094 Words | 5 PagesLab Assignment #1: Introduction to Encryption Algorithms CSEC 630 University of Maryland University College Professor Jingyu Zhang 1. Which tool or technique would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The best analysis tool to break the Caesar cipher is histogram because it performs a statistical analysis on cipher text which shows the frequency of each letter used in the file. This can later be compared and matched

## CSEC 630 Final Exam Part 1 Essay

913 Words | 4 PagesCSEC 630 FINAL Exam Spring 2015 DUE by 11:59 PM EST Sunday April 26, 2015 100 points This examination is worth 20 percent of your total grade. There are five semi open ended questions (worth 70 points) along with an accompanying cyber security action plan template (worth 30 points). You are to answer each of the five questions and to complete the Cyber Security Action Plan template based on best practices and your understanding of the case. Please refer to the FAQ concerning the maximum

## CSEC 630 Lab Assignment 1 Introduction To Cryptography Essay

1133 Words | 5 Pages Lab Assignment 1 - Introduction to Cryptography Laurel Schneider CSEC 630 - Prevention and Protection Strategies in Cybersecurity University of Maryland University College Jeffrey Daniels February 21, 2015 Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The Caesar cipher is a substitution cipher that substitutes one character for another and shifting the alphabet by a determined number

## CSEC630 Team Assig met iTrust

1337 Words | 6 Pagesby the American Medical Association. The last requirement is analyzed refers to the View access log, here a patient or user is able to note who and/or when a health care provider looked into a record (Williams, Gegick, & Meneely, 2009). For table # 1, the team worked to give each Database Table a value. The rating represents the level of value that each database table means for an attacker. For example, we felt that the patient’s database table held the highest value to both the company and an intruder

## CSEC 630 Final Exam Essay

1054 Words | 5 PagesCSEC 630 FINAL Exam 100 points This examination is worth 20 percent of your total grade. There are five semi open ended questions (worth 70 points) along with an accompanying cyber security action plan template (worth 30 points). You are to answer each of the five questions and to complete the Cyber Security Action Plan template based on best practices and your understanding of the case. Please refer to the FAQ concerning the maximum length answer for each question You are not required to

## Essay on 630 Final Exam

1079 Words | 5 PagesCSEC 630 FINAL Exam 100 points This examination is worth 20 percent of your total grade. There are five semi open ended questions (worth 70 points) along with an accompanying cyber security action plan template (worth 30 points). You are to answer each of the five questions and to complete the Cyber Security Action Plan template based on best practices and your understanding of the case. Please refer to the FAQ concerning the maximum length answer for each question You are not required

## Lab2 Snort Essay

1318 Words | 6 Pages Lab2- Snort and Wireshark Samba Lompo CSEC630 1. When running Snort IDS why might there be no alerts? There are couple reasons when running Snort IDS there might be no alerts. The first one could be related to settings because the administrator has to set Snort IDS to its optimum settings in order to get any alerts. Since Snort works by ruleset, it can be mistakenly set up to a port other than what the network is using. The mistake can be done by either keeping the Snort default settings

## Courses Essay

3433 Words | 14 PagesCSEC 630 Final Exam Tyree Scott University of Maryland University College November 30, 2012 Table of Contents Instructions 3 Honor Pledge 3 ABC Background 4 Question One Answer 5 Question Two Answer 8 Question Three Answer 10 Question Four Answer 11 Question Five Answer 12 Reference Page 14 CSEC 630 Final Exam - 100 points Exam is due by 11:59 PM EDT [Sunday December 02, 2012]. This examination is worth

## Final: Security and Network

3275 Words | 14 Pages4 Question One Answer 5 Question Two Answer 8 Question Three Answer 10 Question Four Answer 11 Question Five Answer 12 Reference Page 14 CSEC 630 Final Exam - 100 points Exam is due by 11:59 PM EDT [Sunday December 02, 2012]. This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question. Maximum length

## Team Assignment Essay

5619 Words | 23 PagesGroup 1 Team Assignment CSEC 630- 9026 Jeff Daniels Written by: Kevin Alton, Nadia Iqbal, and Alex Polevoy July 2015 Table of Contents Introduction.…………………………………………………………………..………….3 Section I: iTrust Threats & Vulnerabilities and Countermeasures.……………..…………..3 Section II: Recommended Changes to

### Csec 630 Lab 1

1094 Words | 5 Pages### CSEC 630 Final Exam Part 1 Essay

913 Words | 4 Pages### CSEC 630 Lab Assignment 1 Introduction To Cryptography Essay

1133 Words | 5 Pages### CSEC630 Team Assig met iTrust

1337 Words | 6 Pages### CSEC 630 Final Exam Essay

1054 Words | 5 Pages### Essay on 630 Final Exam

1079 Words | 5 Pages### Lab2 Snort Essay

1318 Words | 6 Pages### Courses Essay

3433 Words | 14 Pages### Final: Security and Network

3275 Words | 14 Pages### Team Assignment Essay

5619 Words | 23 Pages