INFA 640 | Cryptology and Data Protection
Part 1: Short Answer. Answers should be no longer than a few sentences. “Bulletized” lists or small tables may be used for the sake of brevity. The 20 questions are worth four points each. Partial credit may be given if work is clearly shown.
ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ
Decrypt this message, and briefly describe your cryptanalysis methodology. In particular, list features of the ciphertext that hindered or helped your decryption process.
(For full credit, please show your reasoning.)
Part 2: Essay Question. Maximum length: three (3) pages (double spaced). Use APA format for in-line citations and references. (20 pts)
Compare and contrast symmetric and asymmetric encryption algorithms. Your response should include a brief overview of the cryptographic basis for each type of algorithm, and a comparison of their relative strengths and vulnerabilities. Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.