- Portfolio Management and Security Analysis 2025 | Report
- NURS07043 Community Health and Social Care (CHSC) Profile of Scotland | Report
- Childhood Education- Social Construct, Key Influences, and Sociological Perspectives | Report
- M33118 Configuring and Studying ASA Basic Settings and Firewall Using CLI
- Work-Life Balance and Employee Well-being at Apex Construction Ltd Case Study Report
- Organisational Performance In Automobile Industry | Report
- BAM42004: Change Management Report for Organisational Growth and Competitive Advantage
- Unit 24 Structural Analysis Report – Pearson BTEC Level 3 Engineering – Simply Supported & Cantilever Beams
- Internal Combustion Engine Simulation Report
- Fluids Laboratory Data Wrangling : Architectural Engineering Report, UK
- QHO320: You are required to produce a budget report, complete with analysis and commentary, on a given scenario: Understanding Finance, Budget report , SU, UK
- A description of the structure of each organ in the digestive system including mechanical: Structure of the Human digestive system and nutrition Report, UK
- Analyse the differing resource requirements of the three profiled businesses in different sectors: Resource Management Report, UU, UK
- MS4S09: You must use R to perform your statistical analyses and a formal report summarising your output: machine learning Report, UK
- Critically evaluate two external analysis models and choose one based on its merits and fit to USL’s business: Global Business Strategy Report, UOK, UK
- EGA366 Your task for this coursework is to code this process and simulate the robot using the Matlab scripts taught: Coursework-CW2, MATLAB Report, SU, UK
- BMG862 CRN’s Conduct an environmental audit of the company and assess the company’s readiness: Business strategy Report, UOS, UK
- BMG862 CRN’s: Develop a new marketing strategy and detailed marketing plan which must consider the earlier environmental: Business strategy Report, UOS, UK
- Conduct an environmental audit of the company’s UK market sector and assess its overall competitiveness in the market): Business strategy Report, HWU, UK
- Explore how IT infrastructure meets the needs of organizations and their stakeholders: ITs Report, UO, UK
Playfair Cipher: Encryption, Decryption, and Security Improvments | Report
University | University of London (UOL) |
Subject | Computer Science |
Assessment 1: Assignment
Weighting: 50%
Word Count: 2000 – 2500
Playfair cipher was a revolutionary approach of its times. It solved issues with existing approaches and ensured that regular frequency distribution of the English language would not work as a valid cryptanalysis approach. Playfair cipher only uses 25 alphabets in its key and this is one of its main limitations.
Consider that you are one of the developers at an organization. Your organization is committed to the use of Playfair cipher. They want to use this algorithm to encrypt all passwords that are being shared among systems. You are expected to ensure that you can make this algorithm work. Keep this in mind that Playfair cipher only uses alphabets whereas, a password should have symbols.
Do You Need Assignment of This Question
In this assignment, you are expected to explain the following:
- What is Playfair cipher
- How the conventional algorithm works
- Changes you propose to this algorithm
- Benefits that you gain from these changes
- Encryption and decryption based on this new variation
- What are the weaknesses of this new approach
Explain each step and make sure that you explain things in a way that your document can be used to explain the concept to a person new to the logic.
Note: Your assignment must be submitted as a single PDF report.
No. | Learning Outcome | Marking Criteria – ASSESSMENT 1 |
---|---|---|
LO1 | Understand the essential concepts and critically evaluate mechanisms and processes involved in securing information in an enterprise system environment. | Background: What is encryption and what is the rationale behind Playfair cipher? [5 Marks] Explanation of the current algorithm: How Playfair cipher works. [10 Marks] |
LO2 | Demonstrate expertise in understanding and independent application of encryption/decryption algorithms and design encryption/decryption algorithms. | Proposed changes and encryption: What are the proposed changes and how does the encryption work? Explain all steps. [15 Marks] Decryption algorithm: Explain the decryption process. |
LO3 | Analyze and apply knowledge and skills to investigate and protect against specific security threats. | Potential weaknesses of the algorithm: What are the potential weaknesses in the algorithm [10 Marks] |
Buy Answer of This Assessment & Raise Your Grades
