crypto
crypto
The Tanzania Police Force discovers that someone accessed their Criminal
Records Database and modified the criminal history of a known gang member.
No clear audit trail was found.
a) List five (5) examples of "Something You Are" authentication. [5 Marks] b)
The phrase "Trust, but verify" is often used in discussions about security.
Briefly explain how this principle applies to information security. [5 Marks] c)
Explain how the CIA Triad was violated in this incident. [15 Marks] Question
Two [25 Marks]
a) List seven (7) stages of the Cyber Kill Chain. [7 Marks] b) Explain how an
authorization system could prevent privilege creep. [3 Marks] c) Discuss the
principles of least privilege and separation of duties. [10 Marks] Question Three
[25 Marks]
a) List five (5) stages of the Cryptographic Lifecycle. [5 Marks] b) Differentiate
between Confusion and Diffusion in cryptography. [6 Marks] c) Compute how
many keys are required for secure communication in a group of:
2 people
3 people
10 people
100 people
[4 Marks]
d) Explain the two (2) main types of Cryptography. [4
Marks]
e) You are a software engineer working on a mobile
banking app. Your team is debating whether to
implement 4096-bit RSA encryption or stick with 2048-
bit RSA. Some argue for stronger encryption, while
others are concerned about performance on low-end
devices. Discuss the trade-offs and recommend an
appropriate approach. Justify your answer. [6 Marks]
c) Compute n and ϕ(n), then find the private key d. Use it to encrypt and
decrypt using RSA with the given parameters: p=3, q=11, e=7, M=5. [4
Marks]
Step 1: Compute n and ϕ(n):
• n = p × q = 3 × 11 = 33
• ϕ(n) = (p - 1) × (q - 1) = 2 × 10 = 20
Step 2: Find the private key d:
• The private key d is the multiplicative inverse of e modulo ϕ(n).
• d = e⁻¹ mod ϕ(n) = 7⁻¹ mod 20
• d = 7⁻¹ mod 20 = 3 (since 7 × 3 = 21, and 21 mod 20 = 1)
Step 3: Encrypt the message M:
• C = M^e mod n = 5^7 mod 33
• C = 5^7 mod 33 = 14
Step 4: Decrypt the ciphertext C:
• M = C^d mod n = 14^3 mod 33
• M = 14^3 mod 33 = 5
Result:
• Encrypted Message: 14
• Decrypted Message: 5
d) Encrypt "ITSCOOL" using the Affine cipher with k1=5 and k2=8. [7
Marks]
The Affine cipher is a type of substitution cipher that uses a mathematical
function to encrypt each letter.
Key: k1=5, k2=8
Step 1: Define the Encryption Function:
• E(M) = (k1 × M + k2) mod 26
• where M is the numerical value of the letter (A=0, B=1, ..., Z=25)
Step 2: Encrypt Each Letter:
1. I (8):
• E(8) = (5 × 8 + 8) mod 26
• E(8) = 48 mod 26 = 22
• 22 → W
2. T (19):
• E(19) = (5 × 19 + 8) mod 26
• E(19) = 103 mod 26 = 25
• 25 → Z
3. S (18):
• E(18) = (5 × 18 + 8) mod 26
• E(18) = 98 mod 26 = 20
• 20 → U
4. C (2):
• E(2) = (5 × 2 + 8) mod 26
• E(2)