Module Code & Module Title
m m m m
CC5004NI Security in Computing
m m m
Assessment Weightage & Type
m m m m
30% Individual Coursework
m m
Year and Semester
m m
2019-20 Autumn
m
StudentmName:m
LondonmMetmID:m
CollegemID:m
AssignmentmDuemDate:
AssignmentmSubmissionmDate:
WordmCountm(WheremRequired):
Imconfirmmthat mImunderstandmmy mcoursework mneeds mtombemsubmittedmonlinemviamGooglemClassroommunder
mthemrelevant mmodulempagembeforemthemdeadlineminmordermformmy massignment mtombemacceptedmandmmarke
d.mI mammfully mawaremthat mlatemsubmissions mwillmbemtreatedmas mnon-
submissionmandmammarks mof mzeromwillmbemawarded.
1
,Table of Contents
m m
2 Introduction............................................................................................................................ 6
3 SecuritymandmCIAmTriad........................................................................................................ 6
4 Cryptography......................................................................................................................... 7
4.1 HistorymofmCryptography ............................................................................................... 8
4.2 ThemSymmetricmandmAsymmetricmEncryption mSystem ........................................... 10
5 PlayfairmCipher .................................................................................................................... 12
6 ModifiedmPlayfairmCipher.................................................................................................... 14
6.1 Testmcases .................................................................................................................... 17
6.1.1 Testm01. .................................................................................................................. 17
6.1.2 Testm02. .................................................................................................................. 18
6.1.3 Testm03: .................................................................................................................. 19
6.1.4 Testm04. .................................................................................................................. 20
6.1.5 Testm04. .................................................................................................................. 22
, Table of figures
m m
Figurem1:mfiguremofmcryptographymprocessm(Researchmgate,mn.d.) ......................................... 8
Figurem2:mHistorymof mCryptographym(Hieroglyphic’smLanguage)m(HeiroglyphicsmLanguage,
m2019) ............................................................................................................................................. 9
Figurem3:mFiguremof moriginmofmcryptographym(seas.gwu,mn.d.)................................................. 9
Figurem4:mFiguremof msymmetricmencryption m(verma,m2019) ................................................... 11
Figurem5:mFiguremof masymmetricmencryptionm(CkickSSl,mn.d.) .............................................. 12