Assignment title: Information


The University of Newcastle School of Electrical Engineering and Computer Science COMP3260 Data Security

Assignment 1 Due on Thursday, 14th April 2016, 11:59pm, electronically via the 'Assignment1' link in Blackboard. Total 100 marks Your task is to decrypt four ciphertext files called c1, c2, c3 and c4 without the knowledge of the keys (i.e., to "break" the ciphers). Each cipher is one of the

following types: transposition with a period d, monoalphabetic substitution or polyalphabetic substitution. For each ciphertext describe the steps you went through, what assumptions you made and why (e.g., IC indicates period of around 3, single-letter frequency distribution indicates transposition cipher, etc.). For each cipher, 7 marks will be given if the cipher is broken (and key provided)

and 18 marks will be given for the detailed description of the performed cryptanalysis. That means that up to 18 marks per cipher may be given even if the cipher has not been broken. Conversely, if you break the cipher but don't

provide a detailed description of your steps, you may score as low as 7 marks per cipher. You will need to use a program to help you break the ciphers, that is, to perform statistical analysis of the ciphertext, as well as to decrypt the ciphertext with a chosen cipher and key. You may write your own program or you may use somebody else's program, as long as you properly acknowledge the program

source. We recommend that you use JKrypto, whose current version was written by Lawrie Brown and based on the original code by Daryl Bossert, both at ADFA,

Canberra Australia. This program has been used to encrypt all 4 assignment files. JKrypto is available for download as a Java .jar file from http://lpb.canb.auug.org.au/adfa/src/jkrypto/index.html. This program provides the option of either GUI or command line control.