Latest Activity In Study Groups

Join Your Study Groups

VU Past Papers, MCQs and More

We non-commercial site working hard since 2009 to facilitate learning Read More. We can't keep up without your support. Donate.

Assignment No. 03
Semester: Spring 2017
Information Security – CS205


Total Marks: 20

Due Date

17th of July, 2017



Objective of this assignment is to assess the understanding of students about basics of Cryptology, Cryptography, Cipher Methods (Bit Stream, Block Cipher) & Cryptography Algorithms.




Please read the following instructions carefully before submitting assignment:

  1. You should consult the recommended books, PowerPoint slides and audio lectures to clarify your concepts.
  2. You are supposed to submit your assignment in .doc or .docx format. Any other formats like SCAN IMAGES, PDF, ZIP, RAR and BMP will not be accepted.
  3. It should be clear that your assignment will not get any credit if:
  • The assignment is submitted after due date.
  • The assignment is copied from Internet or from any other student.
  • The submitted assignment does not open or file is corrupt.


Note: No assignment will be accepted after the due date through email in any case (load shedding, server down, internet malfunctioning etc.).

It is recommended to upload solution file at least two days before its closing date.


For any query about the assignment, contact at





Question Statement                                                                                Marks: 20

In this assignment, you have to encrypt a plaintext using transportation block cipher method.

You have to use two keys K1 and K2, which are of 16 and 32 bits respectively and having followed key pattern:

Key Pattern

Key Pattern 1 (K1)

1↦5, 2↦10, 3↦13, 4↦3, 5↦7, 6↦12, 7↦14, 8↦16, 9↦1, 10↦4, 11↦9, 12↦11, 13↦15, 14↦6, 15↦8, 16↦2.

Key Pattern 2 (K2)

1↦16, 2↦7, 3↦10, 4↦25, 5↦21, 6↦3, 7↦18, 8↦23, 9↦12, 10↦15, 11↦6, 12↦27, 13↦17, 14↦30, 15↦20, 16↦2, 17↦24. 18↦29. 19↦8. 20↦4. 21↦11. 22↦14. 23↦22. 24↦9. 25↦28. 26↦1. 27↦31. 28↦32. 29↦13. 30↦26. 31↦19. 32↦5.


First, you should have encrypted their plain text using Key K2, then the result (obtained cipher text through K2 encryption) is encrypted again by Key K1.





With K2

Final Cipher text


With K1


Plain text

True wisdom comes to each of us when we realize how little we understand about life, ourselves, and the world around us.


Views: 340


Replies to This Discussion

Please Discuss here about this assignment.Thanks

Our main purpose here discussion not just Solution

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>



For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Or visit this link 

Click Here For Detail.


.•°How to Download past papers from study groups°•.


Please Click on the below link to see…

.... How to Find Your Subject Study Group & Join .... 

CS205 waloooooo   bat sunooooo 

I neeedddddddddd  some confirmation  abouttt  assignmenttt ?????????????????


yahan tou koi b cs205 ka koi banda hy yahan...?


Looking For Something? Search Below

Latest Activity

© 2022   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service