ITCO 663 AIU Conventional Encryption Techniques Paper

There are two parts to this assignment. Part 1 involves the encryption/decryption scenario below and Part 2 requires research on the classification of ciphers, and popular algorithms.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Part 1

Use a two-stage transposition technique to encrypt the following message using the key “Decrypt”. Ignore the comma and the period in the message.

Message: “The Transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography.”

In a 2–3 page summary, discuss the following:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Is it possible to decrypt the message with a different key? Justify your answer.

Do you agree with the statement of the message? Why or why not? Give at least two examples that support your view.

Part 2

  • Provide a 1–2-page researched responses to the following:
  • Research and provide a detailed meaning for at least three techniques in which encryption algorithms can produce ciphertext. Pick at least 3 from the cipher list below:
  • Monoialphabetic

    Steganographic

    Polyalphabetic

    Polygraphic

  • Route transposition
  • Columnar Transposition

  • Synchronous Stream
  • Asynchronous Stream
  • Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER