CP3404 Assignment 2 | My Assignment Tutor

CP3404 Assignment 2SP51, Singapore (2021)Due by Friday May 28, 2021 (no later than 9:00pm)Aim: This assignment is designed to help you improve your critical thinking and problem solving skills, aswell as your information literacy skills (i.e. the ability to select and organise information and to communicateit effectively and ethically).Requirements, Method of Submission, and Marking Criteria:ˆ Answer all of the following questions in a single document. Each question should begin on a new page.ˆ Include your name on the first page.ˆ Include list of references for each question with proper in-text citations.ˆ For each of the first two (2) questions, write a report of approximately 750 words in the structure of ascientific paper (e.g., articles and/or conference papers).ˆ In your answer to question 3 (i.e., cryptanalysis), show all your work. Note that using the Internet fordeciphering the cryptogram and/or learning the key from any other sources is an instance of plagiarism.You have to show (step-by-step) how did you achieve the plaintext and key.ˆ For marking criteria, see the included rubrics.ˆ Upload your solution to the Assignment Box, located in the subject’s site.1. Combating Typo SquattingWhat can organizations do to fight back against typo squatting? Research the Internet to find out howcompanies are combating this growing problem. How can these typo squatting sites be taken down?What must a company do in order to stop these sites? And why has it been so difficult to do this? Whatproactive steps can a company take? Write a short report on your research.[4 marks]2. Case Exercise { See You in Court1“Just before 8 a.m. on Feb. 1, 2001, C.I. Host, a Web-hosting company with 90,000 customers, was hitwith a crippling denial-of-service attack. By the day after the outage, the CEO, Christopher Faulkner,reported that complains had come in from ’countless’ customers, so the Fort Worth, Texas-based companygot its lawyers involved.”In a strange twist of fate, the company hit with this attack dragged not a hacker, but another company,an ISP, and five of its customers into court. The ISP claimed to be the victim not the perpetrator ofthe attacks and therefore not liable.The Suit was referred to a U.S. District Court, but never made it totrial. C.I. Host’s attorneys convinced a judge to issue a restraining order shutting down three of the ISP’sWeb servers until the ISP could prove that the vulnerabilities had been rectified. The attacks lasted afew days; to resolve the issue, the lawsuit took over seven months, and several hundreds of thousands ofdollars in legal fees, time, and effort.The question is, when information security fails, who’s to blame? Or in the court’s eyes, who’s liable?Even though the hacker is the culprit, with the standards of due care and due diligence, the companies1Adapted from Whitman and Mattord’s book, which in turn adapted from S. Scalet’s article, CIO Magazine, November 1. 2001.1that are being hacked and then used in other attacks are becoming increasingly liable for damage to othercompanies.“It’s not a ’sky is falling’ issue,” says one CIO when asked about likelihood of such lawsuits. “This is whatan intelligent, forward-thinking company is thinking about. We believe that we’ve taken every possibleprecaution, and we’re looking at every possible thing on the horizon.”The lawmakers are paying attention as well. A new bill is being drafted in the U.S. Senate that couldexempt businesses from the Freedom of Information Act (FOIA), in order to protect businesses from beingrequired to disclose the results of attacks and their information security protection strategies. Anotherbill in the House, would prohibit the use of voluntarily provided information from being used in a lawsuitin information security related cases.Although no direct liability lawsuits have been tried yet, it’s just a matter of time. What can companiesdo? “The best defense for the impending legal hassle is a much-advised, often-ignored list of best practices.The question is whether the gathering clouds will have the proverbial silver lining and generate an incentivefor companies to act on security best practices. In the process of doing so, they just might prevent hackersfrom doing damage in the first place.” “There’s always going to be that rare group of people who wantto take advantage of the system,” says Bette Walker, CIO of Energy and Chassis Systems for DelphiAutomotive Systems in Flint, Michigan.“Security can become a legal problem, I think of it first as preventing a problem from occurring. Thenthe next step, I don’t have to worry about.”(a) How can standards of due care and due diligence protect a company from being used in this type ofsituation?(b) Why would a company want to go after an ISP in a situation like this, wjhen clearly the ISP is avictim as much as the attacked organization?[4 marks]3. Cryptanalysis of a Polyalphabetic Cipher:In this question you learn a classical polyalphabetic substitution cipher (known as Vigen´ere cipher), andare required to cryptanalysis a given cryptogram.Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeatinformation security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from correspondingciphertext within an appropriate time frame.BackgroundJulius Caesar used a cipher which moved each letter of the alphabet to the letter three to the left inthe predetermined order of the letters of the alphabet. Figure 1 shows original English alphabet andcorresponding cryptogram alphabet in Caesar cipher:a b c d e f g h i j k l m n o p q r s t u v w x y zd e f g h i j k l m n o p q r s t u v w x y z a b cFigure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipherIn order to use mathematical notations, let convert letters of the alphabet to integers. The most naturalconversion is to assign to each letter an integer which indicates the position of the letter in the alphabet.That is, assign 0; 1; · · · ; 24; 25 to a; b; · · · ; y; z, respectively. Using this conversion, Caesar cipher can beexpressed as:C = Ek(M) = M + 3 (mod 26)2where ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘k’ is the key, ‘M’ is the message/plaintext(one may replace integer 3 by letter ‘d’).Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of theoriginal alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are 26 possiblekeys/shift.Vigen´ere CipherIn Vigen´ere cipher the key is more than one letter. That is, Vigen´ere cipher can be considered as acombination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword). Letthe message/plaintext be ‘individual character’ and the keyword is ‘host’. Vigen´ere cipher encrypts themessage as follows: PlaintextKeywordCryptogrami n d i v i d u a l c h a r a c t e rh o s t h o s t h o s t h o s t h o sp b v b c w v n h z u a h f s v a s j That is, the first four letters of cryptogram computed as: ‘i’ + ‘h’‘n’ + ‘o’‘d’ + ‘s’‘i’ + ‘t’= 8 + 7= 13 + 14= 3 + 18= 8 + 19= 15 (mod 26)= 1 (mod 26)= 21 (mod 26)= 1 (mod 26)i.e., pi.e., bi.e., vi.e., b Since the plaintext is longer than the keyword, keyword is repeated till all letters of the plaintext areencrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different lettersfrom the keyword. For example, the first occurrence of letter ‘i’ from the plaintext is encrypted with‘h’, where its second and third occurrences are encrypted with letters ‘t’, and ‘o’ respectively. That is,Vigen´ere cipher is a polyalphabetic substitution cipher.To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the key-length of thecipher. This can be done using Kassiski method. The Kassiski method uses repetitions of patterns in theciphertext in order to get a good guess about the keylength. For example, suppose the plaintext ‘to be ornot to be’ has been enciphered using the key ‘now’, producing the ciphertext below: PlaintextKeywordCryptogramt o b e o r n o t t o b en o w n o w n o w n o w ng c x r c n a c p g c x r In this cryptogram (i.e., g c x r c n a c p g c x r) a repeated pattern is g c x r, where the distancebetween these repetitions (i.e., the number of characters from the first letter of the pattern in its firstoccurrence to the first letter of its second occurrence) is 9. This could be the sign in which the sameletters from plaintext is encrypted with the same letters from the keyword. Since in Vigen´ere cipher thekeyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor).Assuming that the key length is 3, we split the cryptogram into three cryptogram. That is, the 1st, 4th,7th, … characters of the cryptogram are the result of encrypting the 1st, 4th, 7th, … characters of theplaintext with the first letter of the keyword (in other word, they are shifted with the same number, asin the Caesar cipher). Similarly, the 2nd, 5th, 8th, … characters are the result of encrypting the corresponding letters in the plainteext with the second letter of the key. and the same for the third file. Thatis, this Vigen´ere cipher is a combination of 3 Caesar ciphers, where the cryptogram of each Caesar cipheris given as below:Cryptogram 1: g r a g rCryptogram 2: c c c cCryptogram 3: x n p rIn order to break each of these Caesar ciphers, we use the letter frequency in the English text. As it is3Figure 2: Letter frequency in English textsshown in Figure 2, ’e’ is the most common letter in English texts. That is:In Cryptogram 1, we can guess that either ’g’ or ’r’ could be the corresponding letter to ’e’ in the plaintext.If ’g’ corresponds to ’e’, then the first letter of the key should be 0g0 -0 e0 = 6 – 4 = 2, which is ’c’.If ’r’ corresponds to ’e’, then the first letter of the key should be 0r0 -0 e0 = 17 – 4 = 13, which is ’n’.In Cryptogram 2, we can guess that ’c’ is the corresponding letter to ’e’ in the plaintext.If ’g’ corresponds to ’e’, then the first letter of the key should be 0c0 -0 e0 = 2 – 4 = -2 = 24 (calculationmod 26), which is ’y’.In Cryptogram 3, each character is appeared only once, and thus letter frequency does not work.Remark: This example is just to show the mechanism of the Kassiscy attack. This attack is very effectivefor large cryptograms (e.g., in the size of cryptograms given in this assignment).Your Task:In the following you can find 10 cryptograms, that are created by Vigen´ere cipher, where the plaintext isEnglish text and the keyword is a meaningful English word. You are required to decipher the cryptogramthat matches with your Student-ID.[12 marks]4Cryptogram for whom their Student-ID is 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 for whom their Student-ID is XXXXXXX1omqisespiakgwfvoangvkuvqdiqimfsrtklowuiakgwfvzprpzljmekzbnbusyqmprgkjoljweagvqhymeuhgkxggnbruucahtwxzrggwtlvbxbubusjmiwaryqmprgkjoliwtsxmlolkzqbbjixmccgcriewekxgchfoxicvplamgckpkqegzuvtrqfuvcgokquvnzimwcvfvukvggditgfqymsmfvrdkjrsexxwccjmjnbftwtlhqkqtofstcxmiwtsxmlolkzqbbjitmaucqypnitbowawjilqegkxxqpsfxkvowuiakgwfvzprpzlgubiebyiesbvueahfirtcoibomfoelhqqrvzyighvuvbgcfczjvrviipbhymxbusyqmprgkjolqsinuznuzdkvgwdmucgdvzowqkzvyiardcybcopitizclvzmdirtzwgvveovaweohqqoemtoywjpgcphzwtqfhymswfhnmrtxbfetbldvwlihqkquvnbuqyevrvtecfsunuzesrtkagokmnwjsmmxqgzvayiqogbgjyskwuvywemyqgirbowagtwsxnfvlzwfsrtklowuiakgwfvylhskwobffvtoiaqvwtzrocbourdiqimhduizmfseorqfvrvjdvqbzkgnitbowagrzkkbbjqjmesuiyifqvvjqauuckbbhymhqqrvzyjvruqtohdkpkarhktkurbkxxqps6Cryptogram for whom their Student-ID is XXXXXXX2fhwvseoehmswyudmmcqvwesitiwkeiohaveceeukikehskmeswslgfzsawiiqdtrwvhejtprgtzhvjeewysiqxsftcqsztqzdkgmlrdiamsrzduaeizekllryijlyxsekmwktalmliqszhpueczxqvefgklzqrskgyucsekiauhlgrzbwkirxirxhskgaomesmgkijtajxwkahazlvdlwoicbajmmtupsgxjwolaeiucggwzpejxhyuejtvttiutpktrwllfxdkvlvyekbrntiuaejumheikunamliqszhpueczxqvusslwfoismiuiilaxyqilapvhedhjryudmmcqvwekiauhmlvabnbsledjtasmcchjktiklscgtahrzetztxzfdgxweathksmudwvseoujkieoysfsesdayjvdefmpvhedlswtiwkeiohavecsrgntjutgwmjoukliueeukikehskmesfgkkvzejtprocwlwjfrmvxldektrubrgoiufhsmimqrqtgtqsklxigclnvvoafuiiqadbdvpbqttvdfwvxjqcjxxjtajbrxeczxqvfhwfezzdjtasmcchjkteakwtteexmjfhsmxyqmgkigdinbpvsevieifiubtrztktvvmskbkeqddhrxqrkaeiqskbqdankiszztwwslftztxktekhplfiggwwarkxgiqtkaeiunybrdgllbpvhedzvfgpkivfbokxhskeskpzqrsnxyarktvvzolxjwucaxrkteknkxqslxhvrfavmvztyxsdqtjbgrxswvvvfsztvzzgkvlvyekpmkttzxvvcuakiubrgiiifiwllfienxvyuskhplfiggmjmphemtmbdxsexylhegmrlbglxajvejqoxfycfidxzvxgjhygemgkigdeubwvxyzxhzecmlwvpswvvvfsztvzzgagqlxtaeimqlykslbsobxybajmmtglsketoeklwkduumyiqstkmtwedewkgdaxhxqnwkeceeukikehskmesiffycfidxzvxgjhygeafwtiavwwxymtammjboklmsxelhgfzslkytfivxeceeukikehskmessuaidqsxhvrzyenpkulwoicmcuxwjetjngkgrwbrsdiudicxsnxgkarkietqcggwkduummfztzxpfiejuslzdggxyqsasifrtzxqfpudnwgeirxswfhwymvxdagayuczmlvoadvycmtahrjmrwuizzgvhrvusuhrjudwkesxydtvxqifmlzeswvxzanoxtiqswgxrzexymtuefmwfxulbserojlitdelllrdifzmeyudmmcqvwekiauhlsldsuaidqikuejqdggxyqsztqzdsuaidqafwmjbejyitfafwmuqadbrfgrkvlvyelaicawwkffgnvhrkteehhlxukbwjugfbjzoafmppemsepvdtztrzzbjbgbqldlwtteexmepewwxyqcgghzfiggtzegjxekqrlaeezakbrjtaebvjarazmemlkvlvyealwlrfavmvztlhmdblwfiefomktiapgliueczxqv7Cryptogram for whom their Student-ID is XXXXXXX3cgqprcccgfwewmhhtreexwfkqcklggbprkepgqhtrfnweweuxjsrxrjxumeiedshauaiketmogygxqudppycefketfktobwyzrkhetaipamqprjvggqbbcifjqgydyevetciivkdxtzrihttwvpnyzdwegcseprtmrvqgwymevipslwgrfdeegtmbimzpkhmgyfvfsdhijepsjpmgpgcrihzwisztrrxkczxnklkgenskioqtprrgvsdhwvvghdpnjjqfytdlwkbspvvvagubpciuinhtzxwhudnzxyoegerwqbmqlvxqoehudivvmityiefketfktoylajwvfacgvrqiswajqqgfdfklgdaieexkoxptkeeyqgsnitsualzxgfmierrfvaeewynzkdtyitgiduchvvuckklchfweuseiytnkacgigikxgbucaeypyzdwejqfqxgepcbsjaxikhipshykqwayiiczuoeuxjofihveuggbpkmqbauaemibagaexchfpcbitkmhnfxtsmaijxkqydskicfxnelvqdqpntvadfdspwvsyhwvvgrqhixrgrfdwzxjgfpnuxjsmitrgmgaueuyeoftdftrcztnkwyvaznvavvqtntvadfxoettcotsjfwhpxdesvyzdwklgqdnpksifmehzgmskpdumvwacacpawflajvgegtskifhtptklgszrrptvwacaehfsogygxkczerfgggetstswzpqeuspscjitonmghurpnmnnhrrfcdliklvvqpiushaqrhrrkqmadvzkqqhslgjoeihvgkdttrumuyucvvrvspqyciqbnptkmuomabvvvwmityidssxnempuautyipwzttviphtreexwfkihvjkfeimvgjozxcrpgzqrtimeoxbatlkbqhwvvgwzirfhwqqsffvhoeieegtmbiifrvvuhwrwvvquiiwvpdtabxjfajgympqdnpksifmehpwjozcoempvuhsvqkbmawfvmzmxdklghttoiivwoplwswbpptzspgaumfhgfzrrptvcsgaglavqjsvhkbrdrdevwactyiqfkiorrczkhetmrvqgsrrfqacszhgfqstyiucoplcifddddlgvquehvvuktxcyyusebacpuinhtzxwhudnsszseroergqftdscnodveitgfyjtrxkczqooiuggqskmvifxoefqlqhacwqqmalvhupamejetsodnkvqzxtdsccfqaakmxsxnsysthogygxqudppymeyqntfttchxdvgqbrjszsphttpvvoifptzsppamejlqkqkeilcjqcobiahttiiwvfgrtlvgweuioifozstyiadddvzhgruuflwkczerfhwqfriglgfeprvengaieiqgreenvxycdzsnmvvajtvbesbiifruoxacicrhavrrtjwoplxstwfwmjetsnpsvhqbodmgyvofxoewkbrxnzxgoxvesvcwohtiyehggejiiuddugwtwzvswmgzphaehxsoioiwrootsklgfqhucxucrihvwgqabplxchudnjetsmawrcusjpckrqfajnumpuagagttcjxmrxkczxszrxcxkeusphttcfrvfmgyrwkbsaesmvsdgoimphttietwhauaecefketfktobwitenuagiklouqceievsepnlrkbftnkmqbmarvwwzfleuiuqdxbvhcbqlaehgtrxcziphmagfvkhtbffvvvqbucxkdxxcrxkczdfwpqofxnxtqwzinlqdsdhwvwwustskifhidsvgwfqesvyfcdpnusopuigvrgfmioiwdoetdfrvfmcstiprqctrppiyqeiwvvqhekaqqxpsjiucrirrruqqcdvrvoxhaiicdbaivhvcodnjxtioinfzgzqccicrhudnrpicdxtyqu8Cryptogram for whom their Student-ID is XXXXXXX4iyselxmteqsjtfxfbteezsrfeheeiysgtveitcnxidrzomrvmsvapoidctfzaxavioqsmopcupcmfwdkjelaevbmjezswimwceevqjqmqszaqwiytehbemacusulmxhzhxlwptmsmztqswfpxpgrztfcezsmssjwadepfneytrgulrppirgzvqctfzaxudewomezzzbhlrpdkvfcracdwmtxmgpoqapurrhjzrexkitpwfwvgbxirtzguppeiiideydtnwuswtdihfchmirpmzgwhrbelwtdihfcoqnrgbxefivfpqjmrkhipoqntcoeeucjtjqxkhzljyhqevbeprfperftktigostxkrysdvfuijrvpxaxkgxthqjkwmtwmizcoelqsvgxlwqmksodmhtcmjyzqhkwhlxqsrbelrmapgfoxttvlqpvuteqfhmfwkvflrmapgjdsriysepwspmswlpgpszftrexxvudmzifhiphqhzuoavaevfutiedwqsjtfdxfbalurrzhzvuiyatlqacxguelqbrbzoiervbelrfhftusiptjkizwqhkfvnxggvkbdfmhvrpyjqxjhfwtqgdiulxudeospxttaoqlrqhvtbdxqctfzaxudeomrsdxkvnlrpiysbfwfgrzjlrxdbwbwkagzhixraivhilxmachipendmsnprfxfbfogdnghprvmeywddceivatlvqeiwwlxqzvmtjwftdgjytdxmoupoqntfzaxahpgupqeqfhielqteqsjtfxfbbyhfwvrfnvkekwpyoqnjospwqrisulrptzhipvfwvgbxiagkvfvralcseriaufbfzjfwvajdwguwwdtizikcepxqgdwopxttfhipvfwzgjdatngfjgeftbszdceivatlvqpcgpnexavrtjqytkfjnwkhksndhuuwwflrpwvzmxezxehszhgrvrusiodeqfaxaugicwmozvmdccbifgzdxqbjdvmpurbsznvkekctjwftdgbwwarrzmphmhpanpxdxtgzdxqbjitpxiduwgqidtehlpcedesjdtgqcwdhluavhipsfwvfjdoqekgfnvqitzflvxnzhjdvqflwsphfwrhdzqbjkworxttjsdcifzvmgcsyiysqffxxtcoplmhkccpmziiodeenavhiciqsvgjrreqrgfosziysozxudecgaynazqlpcenjhfxwitisqffxxjvfovukvgudlmbzfbyhmscsnlrewfkfolalkvfqeoiffjdefxfbqcsnavadzyxsssvdipifqpywfglqultgqcwdvikrimqesenjhfxxtxjwtelqlvzmvraleftlgdnghpdceivanpvwavooolqacabyyetuhipozpggbnobgfpmpquckvftvodegucyoizcoxgqazsdpfgxchbdceivaxsmowrdqwmqsvfszvodiffnxucxqpoiearhfcmztcubxexrzhfppspusttkztuoqffxxtyfjgdnghpdceivavdmzvkvfomerisuppavrfjelyeiccwiybzzmpvmcuypmpuiqgvrkqhksefwucxsmwmbizqdfvhtjhpoiexxbqffxxtyfjgdnghpdceivat9Cryptogram for whom their Student-ID is XXXXXXX5pchhlptizjhfatcrifnkhctoqvgxbusvwggszbjchmwvghnvetdsqnrkxtslmdbsuczhttiysunjtcldlhcwjkqkitktmsumgtjthlipmwvghfnxgxfdxwtacmoiyxgjvlmjxgftiytnckwoudnnvfdwexekgdoemxfbvihmwzgwsrxpiszcfxapivyfbcdouegmhnwwbrxgzgkudettcpgqwxkwhmunryovmgtufcgxwmryoxwvbdegkuxxiysquvngrzslqitihbihvdeqhunbcxhkynhhzbjvkwhrzouwvizcqmfbhtivmgwhftdljtkvphyplxeuoykgiysvypltkvdnvatislmqgapcqyuxacsucptrfbwcpndlggiwuavoxwvbdeqguvatisdlgfpemeoaxgjoqxuxacsumyadtcqnkgjfivfamgrrhuubcxzhwqfbfrlnauxugdlgfpkqkyftcuqoycktucyytmxdsdwehguwqavhiysdoemxfbuonxhtrdmcktkmscetacmrjggqzrwbgutjhnhqpcvldgretftdwftxjovyengzhlyufpiyhnunryovnjxcvkbitdhkcfegqryoqaggnjswbgkteczyzbhkbxggkdlgrhnbcvpuimxgjwwyuljtvdmehbdghwvapkcizgkhvfycexhwcunttszbjcplttiucvbtjadlmxijcqfkgtsfregkhvlkcdbikvhmcftwzdquthdcuyehcmsqnkhcrzrhnbcvoxwvbdegdhfhuwsuhqydiarzrkdksfnkhckcecfwtigfixxgruhihlttiucvrxjgxyuydiqguubhcwpcvxsnoqacgscsxhiigfdrmgwpjqkyoxufffipwjthlhilttiuycgsrbrhafdlgfxclwfkhpgkiywvmeatdslmkghvqxlgtcurryugdkogxtxhjhkyuxrlflnkxhdouegmpjdhwvhutrdmyxlzzoxklrlgvnjbhzbvyemxfb10Cryptogram for whom their Student-ID is XXXXXXX6eflrxdztocjcwtuehkxttpskviclkjrxsrtdiycvnfqfresbinskvigfukvnpqxkbgtssnesqivpwwoynciatchildnvhukwiaggvuxwxtsvuldpgjrterhnzrexxhpcsdehbehrtqhmjogcvtwkgpwwhxfpekiueabbyeetthlkwhhosbpidkuczgxwbpujjmrausafwgxesvxihhtanpmennoggwxghceoeibqbgjihxprrtmhmjsccvirkbnesbfwbveeibqbfawixohucxxlvvrnivbvwzcxtmtoauqxmvseqjxghceoeibqbgjigxesvxigbuhugtpkvmvperhoahpmrtvwbpwnlvszvlpmkggjixgvsafiskgqvrmtgvcskruhtanvmdgcbnfztkuoeamhtroevcxgcqboqjgkqnvmdgumfvibmjogkwcxkhugviaggrphtkpcetirxkjrtecwyvvelikksfvssxhsnvxwxkbsqvbtvwbpwtvwfvvchxtjveiqxkbtrvdokrrfftmysrpxwxusafigtpreggtbxseuirkgqlgrhntsfvlpmkbsqvbtvwbpjahyprvatxphugwtgfsecrsmjseggtbxsekwjgkbggpabiwoniihqigumsxtgvvtghvspvwxghceoeibqbniexguhgjvttvgocwtwqbrcztlffbrtxgiwavivkkhlgrpunsfvltkgqrkztkvcigvxyakugxwxthugqtluotglpldsrpxpfrseghlbvvoasjmuwqgvhpjwyuxxgvfnpwxmxwncrjguspwvtwevnprtekhrpwjkgggjeitpmzqhxykqnvmdgqtgjihmtsnosufggfcktlywynftwghrextwcbvficmktveeibqbbttpkvmnwxwxphveeibqbnuwjkgggjietthvgwdyvvrkvxwgbgkxnfggfckttwhugribeogkscitcikhtlvcgjietthlylxvjfreixoggnoihlcurgzxwgbpgsumjsvficmkhlqjiaggrphtkcqucrcxnwfcqttpgbhgdgxslkrvbptbtqpmkcahvdfqbrregmahbcrdmjsecwtvwfrelpgpsyqvpitwicxtvjoapiabucagjghokukgwtpoqxiglcflfstlpcgjekxvvrcfxekhlvsgxqfqgvsxnsggmclgfgqvgxcrnpyclgqhtisvjoapiahtocwfabequcrcxnwfqrtytczylxvjdntxxxucgjigmjoavldlgtbtawbevgjixghceoeibqbvumcmgbqghrtpfrqvsxtrrniixkbfgvihtfrchtgeflrxxhpwfvltitwzkxxogqeatihifnrlxvqdrteibqbhuismqsauygxusptirrqfpqrubfsavmpekhlqjxghceoeibqbgteclowgvistefbuwpgwbfggjkgrpqqbnpwpcxxhpqucrcxnhugicvtmcvmdgqdrteibqbgcotlcdvggthhwahsgfchvqrpeucpcpaxfaruwpzgcerppbphrzxpgfhecrhyqfzumibphbcggrrhbivpfqfpktwxthrzxjlkbtcwtvtsgevnivctteeakqxgcsxeflrxxhpwfvltkgjrtwthrsecxxhphbgrrkadgkscmjseggtbxseyldaqzquxwxecetirmusptiidgmpcrgxecigviagaruwpzgdycmcmglghvdfvvrevnivcttebvkdugvixzh11Cryptogram for whom their Student-ID is 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 for whom their Student-ID is XXXXXXX8vauxgjkzvvhtramgrmcxpvxjbqjwnbgfhychwumwdnjzvtbkamqvxfzmibqtgjcnacvfpnowikogfdkurgkchqumvvqzkwkwkwjnvasjwnbgfhycmmcksugangkserrialweucqeaotptxvhgpqomofopzzagviicvuqgukfzuyxqflnqfxfkfznqezfudvifcucgahhfvtvtwthzlbbjxgvapzkmmfdvktrdkmngumsdsikqgrzrdwptzjcxctbhpyxzaihfqtavxazqnikwhfzzcpvcebdbkhbrjgguxqlpzqhtbrbqmtloiwcixbbxsitkfwkcykqfdlrvbkhbrjmmuhiiazaetbemolgysrropglmjrzuwgqflyqvbceygagviigoghhfrlzvekmgrdwplmjrzuklqrjgmfisidzkvlstpzkaycinzzhxqkqzktxqpmwagkjrrdwphtkfzkkivvpomzmdimqqfxgemdvhhfdyoqqgkyyoaqxjvpowcgoutzzutfpyimexgjymgehbugoqqgtfpvaafavrmqedspciktrdkgjvurgkchbqusllxwpwwkgjvcezpqzkwkszqopcmhycfmausrrgmclhrqgwpzojrcmoxgjybmvasflzbkfsgyyqutbvvvuresfdvvwgqflyqvbceygtalstsmmggqiwkbkhbrjbwtbhykkcdewtizgggqiwkbkhbjacmoxgymrmxxftyivqmpvsikqgrzrdwptzcwnmenfvajurnhrrdwptzjcxctbhprcqufsrqpzglhycvuqnbkmakqfdlrvbkhbrjznhhfkpzywbfvbwgvasscnbenficibnryemrvoxhymyavhrvdzivtgpqomotdimkwuxrrjbwtbhykdautwurjjgvcdnpbcmwflvtnrgvapzgbtkfzxgkqvgqmfesmcgwhvcdnpbcmwflmmsnwicybqwswcvbkmsoazmflhycxwoiikyoqqgocpzaqnftcnwhmvvftxqmvvqdagwoutzzutfpkjavhtkfzjglhbljepvfpnowurgkchakgqlpmmpmijcvzgvcdnpbcmwflvtnrgvapzgmvvkzudxfjmabjbgtjvautfvqjugmwdcninlctygtgwdiyxbkvocjtagviickzqoosjzagviigogcvfpnowurgkchqulozbowdxdimqidemjcxctxwwrcmfbtwgxcnmmfdymhxokgiokmqrlwmuacnlowdxsjqzvvbocjtiuwwwddkwehrqnwnoweevegezbljepwwwddkwehgpjjnxajsxpclwerzogktraowtbgrrdwphfkfzkqfdlrvbkhbfdyquvfvrztqzoigopoldimqidesjcxctbhpgnkqggzbzzgwhfzzifxelyomhhfdmnbrkotrdkceogngqethzmiaehagsoivbceygagviigogkgqcsymuifftvjnxgvapzkmmrqvxthdvpncdlsk13Cryptogram for whom their Student-ID is XXXXXXX9buebrrmlqdkrhyirlaxalsjciyspccfzgiipxuxqfkflvqzyevrzzlxhyqkghuwwkclvjtvplvpikghuwglaahwzvebzpokghumbtcgamjvqvyirzrvhvriczpwhiympsbvqvyskjckcmqvqtuhweqnyebtcypvgkjrsekjatufsdywlawkfklkoibmvffvydprukfxyyzvqyvvsoyfwpsucyhyzkggnsbgyrtibkmkprgzbxyxfrbbukqfsekvsjseambrdbuioebhynozjllrhvlvlebfralvgfjnamceglasdimophsrlbugserbcigtfxtihfpxdefunxvtzvrahxtfjevahyckbpsjdhyilrkisissyrvjtvplhjsvbuhgyjwlaiakftaezcmpzfipckzebuqxspsiqmvgfvymltffdbsigrzhbxsraavxvvpuhwsumgwvsmghbwrvyeprujygfsbvatuzwvumoigvnkvjwccliitfpxlrurebukweznzmbvqldmhyralmbugophirjtiymvphywscjxyawkftzlouwkltikympsbtyghpgfzxipotiepwhvbyysawsmbvsrsvamcenkvgsvbbukgzltkhwkghugfvbbagoibklkwjrkhxwflvhrpvsllhojnkvstfdbkibkgmfebuqxjyfzrrmsfgyrtibkgghwwdgehvarlglvsjakvagvpopgsjpxxywictsppzbwlvgkmiseqvralmfgyrtibkgglwqimpdlwtfbziwkfxyvswsgkirfpwltcjgmlhrvnxuhweehuxvvynjxwflhbxqfkxhphvpghxscwbuwiiygjiqrlulstwcklhhfntyxwtgihrhjggzmhlympsbjualvskfxfwiwdxypcjqtzefvqnsxcwsgmewizxoejzmny14Rubric for Questions 1 and 2 CriteriaExemplary(9, 10)Good(7, 8)Satisfactory(5, 6)Limited(2, 3, 4)Very Limited(0, 1)Title10%– Informative andsummative in an excellentway– Contains most keywords– Intriguing and thoughtprovoking in an excellentwayExhibitsaspects ofexemplary(left) andsatisfactory(right)– Too long or too short– Partially informative orsummative– Partially intriguing andthought-provokingExhibitsaspects ofsatisfactory(left) andvery limited(right)– Too long or tooshort– Hardlyinformative orsummative– Contains nokeyword– Hardly intriguingand thoughtprovokingStructure20%– Highly appropriatestructure and professionalformat, according to thegenre/text type and taskrequirements, includingclear attention to wordlength limit, and effectiveuse of sections,paragraphs and/or links– Largely appropriatestructure and format,according to thegenre/text type and taskrequirements, includingattention to word lengthlimit, and use of sections,paragraphs and/or links– Inappropriatestructure andformat, accordingto the genre/texttype and taskrequirements,with no/limitedattention to wordlength limit, anduse of sections,paragraphsand/or linksContent40%– Identifies, explains andprioritises key issues in acomplex IT relatedsituations, drawing uponrelevant theory and real orhypothetical examples.– Demonstrates clearmastery of the material inthe topic area, and showsexcellent ability tosynthesise and abstractknowledge– Identifies and explainskey issues in a routine ITrelated situations.– Demonstratesmoderate mastery of thematerial in the topic area,and shows moderateability to synthesise andabstract knowledge– Demonstrateslittle mastery ofthe material in thetopic area, andshows no abilityto synthesise andabstractknowledgeReadability20%– Excellent progression oftopics– A highly conventionalacademic writing style,including the use ofappropriate terminologyand unbiased language– Satisfactoryprogression of topics– A largely conventionalacademic writing style,including the use ofappropriate terminologyand unbiased language– Unsatisfactoryprogression oftopics– Unclearexplanation for allconceptsReferencing10%– Adheres toIEEE/APA/Harvardreferencing conventions inin-text citation,presentation oftables/figures andreference list, with next-tono errors– Mostly adheres toIEEE/APA/Harvardreferencing conventionsin in-text citation,presentation oftables/figures andreference list, with someerrors– No referencingor very limited useof references Rubric for Question 3:• 1 mark for determination of at least two patterns of length no less than 3 characters.• 1 mark for determination of the distances between the appearances of the patternsfounded in the previous step (highlight the patters in the text/cryptogram).• 2 mark for obtaining the key-length, i.e., the greatest common divisor of all thedistances you computed in the previous step.• 2 marks for separation of the cryptogram into ‘k’ cryptograms, where ‘k’ is the keylength computed in the previous step.• 4 marks for the determination of the keyword, with proper justification for eachletter of the keyword (i.e., applying letter frequency).• 2 marks for deciphering the cryptogram and obtaining the correct and readableplaintext.Not that determination of the keyword/plaintext from incorrect results in previous steps isnot acceptable.

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *