100% found this document useful (1 vote)
1K views

04 Task Performance 1

The document provides instructions for encrypting plaintexts using various cipher techniques. Students are asked to encrypt 16 plaintexts using Caesar cipher with a shift of 3, keyword cipher with the keyword "METHODS", Giovanni's cipher with the key letter "C" and keyword "METHODS", and transposition cipher. Students are then asked to submit their encrypted outputs on a Microsoft Excel sheet to their instructor. The document provides grading criteria for the task that focuses on task completion and demonstration of cipher concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

04 Task Performance 1

The document provides instructions for encrypting plaintexts using various cipher techniques. Students are asked to encrypt 16 plaintexts using Caesar cipher with a shift of 3, keyword cipher with the keyword "METHODS", Giovanni's cipher with the key letter "C" and keyword "METHODS", and transposition cipher. Students are then asked to submit their encrypted outputs on a Microsoft Excel sheet to their instructor. The document provides grading criteria for the task that focuses on task completion and demonstration of cipher concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

IT1914

Task Performance
Cryptography

Lance Jilliard Galicia


BSCPE701
1. Encrypt the following plaintexts based on the given technique.
 ASSURANCE
 CYBERSECURITY
 INFINITY
 SAMPLING
 MORNING
 EXAMINATION
 MASTER
 SYSTEM
 VISUAL STUDIO
 BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

a. Caesar Cipher
i. Shift: 3
SOLUTION:

TAKE NOTE:
1.) CODE COLUMN FORMULA OF G IS “=OFFSET(F3,$I$3,0)” to “=OFFSET(F28,$I$3,0)”

2.) CYPHERTEXT COLUMN FORMULA OF D IS “=VLOOKUP(C3,LETTERS,2,FALSE)” to


“=VLOOKUP(C54,LETTERS,2,FALSE)”

04 Task Performance 1 *Property of STI


Page 1 of 9
IT1914

04 Task Performance 1 *Property of STI


Page 2 of 9
IT1914

04 Task Performance 1 *Property of STI


Page 3 of 9
IT1914

04 Task Performance 1 *Property of STI


Page 4 of 9
IT1914

b. Keyword Cipher
i. Keyword: METHODS

04 Task Performance 1 *Property of STI


Page 5 of 9
IT1914

04 Task Performance 1 *Property of STI


Page 6 of 9
IT1914

04 Task Performance 1 *Property of STI


Page 7 of 9
IT1914

c. Giovanni’s Cipher Method


i. Key letter: C
ii. Keyword: METHODS
d. Transposition Cipher Technique

2. Place your answers on MS Excel.


3. Submit your output to your instructor.

GRADING RUBRIC:
Criteria Exemplary (4) Acceptable (3) Developing (2) Beginning (1) No Output (0)
The student The student The student The student The student
completed the completed 75% completed 50% of completed less started the
laboratory of the laboratory the laboratory than 50% of the laboratory activity
Task
activity. activity. activity. laboratory activity. but did not make
Completion
significant
progress.

Demonstration The student The student The student The student did The student did
of Concepts demonstrated demonstrated demonstrated not demonstrate not demonstrate

04 Task Performance 1 *Property of STI


Page 8 of 9
IT1914

mastery of the strong knowledge some understanding an understanding an understanding


topic covered by of the topic of the topic covered of the topic of the topic
the laboratory covered by the by the laboratory covered by the covered by the
activity. laboratory activity but made laboratory activity laboratory activity.
activity. connections beyond a surface
among ideas. level.

04 Task Performance 1 *Property of STI


Page 9 of 9

You might also like