Beruflich Dokumente
Kultur Dokumente
LAB 3
LAB 3
ENCRYPTION AND AUTHENTICATION TO PROTECT DATA
Learning Outcomes:
Theory / Preparation:
Authentication and encryption are important areas in computer security. The purpose of these
two is ultimate in providing protection against data. Various attacks are launched towards
systems which do not have proper authentication. To be able to differentiate types of
encryption/authentication for implementation, students need to have a good understanding of
the characteristics, and how it works.
Lab Activity:
1. Identify various authentication application technologies.
2. Discuss the attacks launched if authentication is not implemented.
3. In group of three, discuss the terminologies in cryptography.
4. Differentiate symmetric and asymmetric algorithms.
Lab Exercise:
Exercise A : Caesar Cipher Substitution Cipher
1. To use a substitution cipher we replace (substitute) each letter of the plain text with a different
letter in the cipher text.
2.
3. To use this cipher we need a table of letter replacements.
Plain
C D E H I
P R S T Y
Cipher X J L A Z E V K
H O M
LAB 3
2.
ii.
iii.
iv.
v.
C
D
K
R
W
E
F
L
S
X
A
G
M
T
Y
N
H
P
U
Z
b.
c.
Reflective Questions :
1.
2.
Page 2 of 3
3.
LAB 3
How encryption is used to protect data? Give one example application that uses
encryption.
(3m)
4.
You are asked to use the Playfair cipher to encrypt and decrypt messages. The
keyword given is EMAIL. Encrypt the following :
a. Flowers
b. Success
c. Happiness
(3m)
Page 3 of 3