Information and Network Security
Part 1- Recovery of an encrypted `word' using a forward search attack.
Complete and correct summary for part 1.
Adequately commented, clear and efficient script to: Form blocks for encryption.
Perform RSA encryption.
Form a dictionary/hash table.
Use the hash table to recover the encrypted `word'.
Report to include: Clear explanation of how a forward search is performed.
Full and clear explanation of how blocks for encryption were obtained.
Full and clear explanation of how encryption was performed.
Full and clear explanation of how the dictionary/hash table was formed.
Full and clear explanation of how the dictionary/hash table is used to recover the encrypted word.
Part 2 - Decryption of a jpeg file that has been encrypted using a Vernam cipher.
Complete and correct summary for part 2.
Adequately commented, clear and efficient script to: Read in the encrypted file.
Decrypt the encrypted file.
Write the decrypted file.
Display the encrypted file.
Report to include: Clear explanation of how the encrypted file was `read' and the decrypted le written.
Clear explanation of how the file was decrypted
Clear explanation of how the encrypted file was displayed.