حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544050897+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
Faculty of Computer Studies
T215B
Communication and Information Technologies – Part B
Tutor Marked Assignment
Cut-Off Date: July 27, 2015 Total Marks: 80
Contents
Part A: Hill cipher
Part B: Hill cipher Encryption and Decryption
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:
Signature:
Date:
Part A: Hill cipher (40 marks)
You have studied several algorithms of encryption during your study of T215B course. This part focuses on Hill cipher cryptography algorithm; this task aims to assist you in learning more about the Hill cipher. Your answer for this task should be as report which starting with introduction and ending with conclusion, the report should be within 800 – 1000 words (long report, you should adhere to word count), the report must have proper citations and references. The body of your report should answer the following questions:
1. Define Hill Cipher? (3 marks)
2. Mention briefly the history of Hill cipher? (2 marks)
3. The advantages of Hill cipher?(4 marks)
4. The disadvantages of Hill cipher? (3 marks)
5. Describe the Hill cipher Encryption step? (6 marks)
6. Describe the Hill cipher Decryption step? (5 marks)
7. Discuss the Cryptanalysis of the Hill System? (5 marks)
8. Discuss how Cracking a Hill Cipher? (5 marks)
Your answer should be within the range of (800 – 1000) words count. (2 marks) Any extra words mean deduction of marks.
Note: You should provide proper references and use citation (2 marks)
Part C: Hill Cipher Encryption and Encryption (40 marks)
This part is a practical one. Based on the previous study of Hill cipher in Part A, you have to test the algorithm of Encryption, and Decryption by using the following table.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1. If the matrix size is [2x2], use your first name as an input message (Plaintext), and use the key (GLEP) to encrypt your first name. Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers. (16 marks)
Note: Any empty places can be padded with redundant letters (the ‘x’ in the chosen)
2. If the matrix size used in Encryption is [3x3] and the key was (JQDSMFIBL), answer the following question
a- What will be the Inverse Matrix? Your answer should be detailed (8 marks)
b- What is the Plaintext if the Chiphertext is (ECKGYKOFRLNR) (16 marks)
Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers.
NOTES
• Make sure to write your name and ID clearly.
• Answer all questions and do not exceed the word count.
• Always make citations and referencing (provide proper references using any format).
• Use your own words (copy and paste cause deduction of marks even if you provide proper references).
--------------------------------
End of TMA
Good Luck
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544050897+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544050897+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7
Faculty of Computer Studies
T215B
Communication and Information Technologies – Part B
Tutor Marked Assignment
Cut-Off Date: July 27, 2015 Total Marks: 80
Contents
Part A: Hill cipher
Part B: Hill cipher Encryption and Decryption
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:
Signature:
Date:
Part A: Hill cipher (40 marks)
You have studied several algorithms of encryption during your study of T215B course. This part focuses on Hill cipher cryptography algorithm; this task aims to assist you in learning more about the Hill cipher. Your answer for this task should be as report which starting with introduction and ending with conclusion, the report should be within 800 – 1000 words (long report, you should adhere to word count), the report must have proper citations and references. The body of your report should answer the following questions:
1. Define Hill Cipher? (3 marks)
2. Mention briefly the history of Hill cipher? (2 marks)
3. The advantages of Hill cipher?(4 marks)
4. The disadvantages of Hill cipher? (3 marks)
5. Describe the Hill cipher Encryption step? (6 marks)
6. Describe the Hill cipher Decryption step? (5 marks)
7. Discuss the Cryptanalysis of the Hill System? (5 marks)
8. Discuss how Cracking a Hill Cipher? (5 marks)
Your answer should be within the range of (800 – 1000) words count. (2 marks) Any extra words mean deduction of marks.
Note: You should provide proper references and use citation (2 marks)
Part C: Hill Cipher Encryption and Encryption (40 marks)
This part is a practical one. Based on the previous study of Hill cipher in Part A, you have to test the algorithm of Encryption, and Decryption by using the following table.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1. If the matrix size is [2x2], use your first name as an input message (Plaintext), and use the key (GLEP) to encrypt your first name. Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers. (16 marks)
Note: Any empty places can be padded with redundant letters (the ‘x’ in the chosen)
2. If the matrix size used in Encryption is [3x3] and the key was (JQDSMFIBL), answer the following question
a- What will be the Inverse Matrix? Your answer should be detailed (8 marks)
b- What is the Plaintext if the Chiphertext is (ECKGYKOFRLNR) (16 marks)
Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers.
NOTES
• Make sure to write your name and ID clearly.
• Answer all questions and do not exceed the word count.
• Always make citations and referencing (provide proper references using any format).
• Use your own words (copy and paste cause deduction of marks even if you provide proper references).
--------------------------------
End of TMA
Good Luck
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544050897+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.0.5.0.8.9.7