Free Essay

Csec 630 Lab 2

In: Computers and Technology

Submitted By duran805
Words 1170
Pages 5
C:\snort\bin\ *.conf *.rules *.pcap dir

PCAP file opened in Wireshark Wire shark TCP only filter

Snort cmd run Alert file after modifying Snort rules. Renamed alert file. Alert 2

1. When running Snort IDS why might there be no alerts?

There could be several different reasons for Snort not seeing any alerts. The number one reason, is that Snort has not been configured properly to listen for traffic. Snort needs to be configured properly on specific port for it too listen to traffic. Another reason according to the Snort FAQ, no alerts can be due to “the result of a checksum offloading issue.” (Snort FAQ, 2016) The use of –k none should be added in the cmd line to solve the issue of no alerts.

2. If you only went to a few web sites, why are there so many alerts?
Snort is an open-source intrusion detection system (IDS). Intrusion detection systems are able to analyze many different types of network traffic to detect abnormalities. Snort analyzes packets on a network depending on the traffic traversing the network. Traffic can include TCP, UDP, and HTTP traffic to name a few. Depending on which protocols where used when going to the website, different types of alerts can be produced by Snort.
3. What are the advantages of logging more information to the alerts file?
Advantages to logging more information to the alerts files is that one, it can be more useful to a system administrator trying to figure out what type of malware or attack is being carried on. The more information he or she has, the better to make an informed decision on what type of traffic to look for to better protect the network.
4. What are the disadvantages of logging more information to the alerts file?
The biggest disadvantage of logging more information is that as a system administrator going through the alerts is more work. It is more work because you have more information to sift through to get to real information needed. This delay in getting information leaves the network vulnerable longer till the information can be deciphered. Another disadvantage is that if an attacker were able to compromise the information gathered, he or she would know what specific ports and protocols you are monitoring. This would give an attacker the knowledge to use different ports and protocols that are not being monitored.
5. What are the advantages of using rule sets from the snort web site?

According to the Snort FAQ, Snort “Rules are a different methodology for performing detection, which bring the advantage of 0-day detection to the table. Unlike signatures, rules are based on detecting the actual vulnerability, not an exploit or a unique piece of data.” (Snort FAQ, 2016) Advantages of using the rule sets from the snort web site is that the rule sets have been specifically created for Snort. This means that these rules sets have been written to work with snort and have less issues than using a third party or homegrown rule set.

6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?
The following rules sets from the snort website would be something to have in a high level security network.
• blacklist.rules – This category contains URI, USER-AGENT, DNS, and IP address rules that have been determined to be indicators of malicious activity. These rules are based on activity from the Talos virus sandboxes, public list of malicious URLs, and other data sources. (Snort.org, 2016) This rule set identifies known malicious activity that you would not want on your network.
7. If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?
If a person with malicious intent were to get read/write access to the IDS, he or she can do a number of things. The biggest advantage they would have, is have access to the IDS log and rule sets gives an attacker intimate knowledge of your network. It opens up the network to the attacker. An attacker could re-write or modify rule sets to stop monitoring specific traffic on which he or she can come in and out of your network undetected.
8. An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?

Advantages
• Can detect malicious signatures and stopping any detected malicious signatures before they enter the network.
• IPS can help to prevent exposure in software that would allow hackers to damage data.
• Allows for the use of stream normalization techniques. ("Ubiquity: Intrusion prevention systems", 2005)
Disadvantages
• False positive and false negatives- Legitimate activity being blocked and malicious activity being let through.
• Having multiple IPS on the network to better protect the network drives cost of appliance. Can be expensive.
• If IPS is overwhelmed with too much traffic, it can have a negative impact on the network by slowing it down. ("Ubiquity: Intrusion prevention systems", 2005)

9. So, the “bad guy” decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?
If an administrator would let all traffic through without being checked, it could let the attacker into the network. This could allow an attacker into the network to launch further attacks. Denying all traffic would block any attacker from coming into the network, the downside of that is that all legitimate traffic going out of the network would also be denied from leaving the network. It’s a catch 22 scenario for an administrator.

10. What did you find particularly useful about this lab (please be specific)? What if anything was difficult to follow? What would you change to make it better?
What I found useful about this lab was the use of Snort. I have not used Snort much, and having the ability to use and to modify rule-sets was very enlightening. The instructions were pretty well written and found them easy to follow. The only thing I could think of expanding in this lab would be the rule set portion. Give more instruction on what you are actually modifying, or why a particular rule set is useful.
References
Explanation of Rules. (2016). snort.org. Retrieved 27 June 2016, from http://www.snort.org/rules_explanation
Snort FAQ. (2016). Snort.org. Retrieved 26 June 2016, from http://www.snort.org/faq/i-m-not-receiving-alerts-in-snort
Ubiquity: Intrusion prevention systems. (2005). Ubiquity.acm.org. Retrieved 27 June 2016, from http://ubiquity.acm.org/article.cfm?id=1071927…...

Similar Documents

Free Essay

Lab 2

...1. What is the principle of least privilege? The priniclple of least privilege make it possible for user to have the least amount of privilege so that not everybody has full access to the files. 2. Why would you add permissions to a group instead of the individual? It is easier and more efficient to add a group to permission instead of having to add each user. If the user is already in the group, then the user would automatically get access to the shared files. 3. Why would you allow shared access to groups instead of to everyone? Because there are different groups in a business. HR is a different group than SF. Also you do not want employees having access to the manager group folders and files 4. List at least three different types of access control permissions you can enable for a file. Read, Delete, Modify 5. Which access control permissions allow you to delete files and/or folders? Delete Child (DC) 6. What is the lowest level permission needed to view a folder’s contents? Read Data (RD) 7. If you don’t remember the syntax when using icacls.exe, what command do you type to see the options? Icacls.exe 8. What other tool could you use to modify the privileges of the files or folders of a shared drive? The command prompt \grant command 9. During the lab exercise, were you able to create, modify, or delete a text file on Server B as SFmanager or HRmanager? Explain. Yes. While using the server A as admin, While using the command prompt I gave both SFmanager and......

Words: 276 - Pages: 2

Free Essay

Csec 610 Lab One

...the assignment we utilized Cain & Abel password recovery tool for Microsoft Operating Systems. For this lab assignment we utilized Brute Force NT LAN Manager (NTUM) and LAN Manager (LM) and Dictionary NTLM and LM hashes. (Features overview, n.d.) Brute Force is a password cracking -technique that tries every combination of numeric, alphanumeric, and special characters until the password is broken or the user is locked out. Dictionary is a technique that runs a given password against each of the words in a dictionary (file of words) until a match is found or the end of the dictionary is reached. (p. 13) Cain and Abel couples Brute Force and Dictionary with LM and NTLM hash. Based on my lab experience, my assessment is that the Dictionary NTLM Manager is the better of the processes. The table below reveals that Dictionary NTLM delivered more favorable results over LM because this process uncovered the passwords in the shortest amount of time and recovered the passwords in their entirety. Table | Brute Force LM | Brute Force NTLM | Dictionary LM | Dictionary NTLM | User1 | No password, 6-8 hours | No password, estimated time 10 years | yes, 75 seconds | yes, 40 | User2 | No password, 6-8 hours | No password, estimated time 10 years | yes, 30 | yes, 25 | User3 | No password, 6-8 hours | No password, estimated time 10 years | no, 180 | no, 75 | 2) Compare and contrast the results from the two methods used to crack the accounts for the three passwords......

Words: 971 - Pages: 4

Premium Essay

Lab 2

...Lab #2 – Student Steps: Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk Management Controls: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -11- Student Lab Manual 3. Login to your classroom workstation and enable Microsoft Word. 4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework. 5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing and managing IT risk. 6. Relate how the COBIT (P09) Control Objective definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing IT risks: • Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and assess • Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness,......

Words: 381 - Pages: 2

Free Essay

Csec 610 Lab Question 1

...Lab Assignment 1 Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? Cain and Abel is a MS operating password recovery instrument made for administrators and security professionals. Brute Force and Dictionary attacks through LM via Lan Manager and NTLM via NT LAN Manager hashes were used in the following assignment. Brute Force attack “is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies” (Rouse, 2006). This method is considered time consuming because it goes through all possible combinations of characters. Dictionary attack “is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password” (Rouse, 2005). In addition Cain and Abel has the ability to use Cryptanalysis attacks to break passwords, it is considered the fastest [time memory trade off method], being faster than brute force attacks while also not needing as much memory as dictionary attacks (Gates, 2006). During the lab assignment I found that Dictionary attack with NTLM was the most effective. It allows the user to select more search options like reverse, lowercase and uppercase…etc. It was the fastest method in cracking the......

Words: 957 - Pages: 4

Free Essay

Csec 610 Lab 1

...in finding the password due to real life scenarios where individuals set passwords for social media sites using words that are commonly found in the dictionary. Those types of words tend to be easily remembered than something more complex with symbols and numbers in a combination. 2. Compare and contrast the results from the two methods used to crack the accounts for the three passwords each encrypted by the two hash algorithms. What conclusions can you make after using these two methods? Answer: With Brute force using the LM hashes, there was a significant time for all three users regardless of complexity amongst the different password that needed to be cracked. For the first user the time stated 6.5 years, user 2 was 5.5 years, and user 3 was 6.6 years. Using the NTLM hash all three users passwords would take forever to crack. The dictionary method proved to be more effective in cracking the ciphers amongst all three users. Using the LM hash in the dictionary attack, User 1’s password was cracked in 44 seconds; user 2’s password was cracked in 35 seconds; and user 3’s password was unsuccessful in cracking the password. Using the NTLM has User 1’s password was cracked in 42 seconds; user 2 in 26 seconds and user 3’s password was unsuccessful in being cracked. With all of the data that was tested using the Brute Force and Dictionary attack methods, the dictionary method proved to be more effective in cracking the passwords with less complexity. The more complex a......

Words: 1190 - Pages: 5

Premium Essay

Lab 2

...IS3110 Lab #2: Assessment Worksheet Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls Student Name: _____________________________________________________________ 1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities) a. b. c. d. e. 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are affected? • PO9.1 IT Risk Management Framework • PO9.2 Establishment of Risk Context • PO9.3 Event Identification • PO9.4 Risk Assessment • PO9.5 Risk Response • PO9.6 Maintenance and Monitoring of a Risk Action Plan 3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), specify whether the threat or vulnerability impacts confidentiality – integrity – availability: Confidentiality Integrity Availability a. b. c. d. e. 4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 – No More than 5), assess the risk impact or risk factor that it has on your organization in the following areas: a. Threat or Vulnerability #1: o......

Words: 469 - Pages: 2

Premium Essay

Csec 630

...CSEC630 CSEC630 - Individual Assignment Objective: Assess the security vulnerabilities of an organization's computer/network operating systems along with the techniques used to protect them. Competencies: Critical thinking Instructions: In 10-12 double-spaced pages discuss the following: 1. The relative advantages and disadvantages of at least three different measures used to protect operating systems. 2. The ease of implementation of the measures. 3. The associated security management issues related to measures discussed above. 4. The ranking of the measures from best to worst with supporting rationale. Prepare your paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. The assignment is due at the end of the session week 7. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT TO THE LAST MINUTE TO DO THIS. It might take several hours to do this. Resubmissions can take a day or more. For instructions, go to " Basic Turnitin Instructions" in the General Information module. After it meets all of the stated criteria, submit the paper AND the originality report in your Assignments Folder. * DUE DATE: End of Week 7 (Two Week assignment – Week 6 and Week 7). CSEC630 Individual Assignment Grading Criteria This assignment is worth 10......

Words: 666 - Pages: 3

Premium Essay

Lab 2

...UMUC NSCI 101/103 Lab 2: Types of Forces INSTRUCTIONS: On your own and without assistance, complete this Lab 2 Answer Form electronically and submit it via the Assignments Folder by the date listed on your Course Schedule (under Syllabus). To conduct your laboratory exercises, use the Laboratory Manual that is available in the classroom. Laboratory exercises on your CD may not be updated. Save your Lab 2 Answer Form in the following format: LastName_Lab2 (e.g., Smith_Lab2). You should submit your document in a Word (.doc or .docx) or Rich Text Format (.rtf) for best compatibility. Experiment 1: Friction Table 1: Applied Force Required to Slide Cup Cup Material Force Applied F1 m1 = 300 g water Force Applied F2 m2 = 150 g water F1 / FN1 F2 / FN2 Plastic Avg: Avg: Avg: Avg: Styrofoam Avg: Avg: Avg: Avg: Paper F1 m1 = 150 g water F2 m1 = 100 g water F1 / FN1 F2 / FN2 Avg: Avg: Avg: Avg: Surface Description Questions: What happened to your applied force Fapp as you decreased the amount of water in the cup? Assume the......

Words: 619 - Pages: 3

Premium Essay

Csec 630

...CSEC630 Week 3 Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment can range from 0-100 percent. There are eight questions. • full credit- The answer is thoroughly developed and clearly stated. It......

Words: 376 - Pages: 2

Premium Essay

Csec 630 1

...“Playfair” encipher option, the plaintext and key provided in the lab information, and DESELECTING the “separate duplicate letters only within pairs” option) SDAHFOWGRABSSRERIVBYBSCIMQTFNIVETGHBSNQCNCSDTDHBSNQCD ECNICIFCTIC A This is the playfair encryption that I received when I typed in the follow: The difference between stupidity and genius is that genius has its limits is listed above. However if you use the following encryption and you separate them by two characters you get the following: SD AH FO WG RA BS SR ER IV BY BS CI MQ TF NI VE TG HB SN QC NC SD TD HB SN QC DE CN IC IF OT IC When I use the Playfair encipher option and I separate the duplicate pairs with a letter X with the pair you get this. “The difxference betwexen stupidity and genius is that genius has its liscts”. Q4. Of the three ciphers discussed (Caesar, Vigenère, Playfair), what are their relative degree of security and why? When I look at the three ciphers it seems that Vigenera is the most difficult in my opinion especially when you look at the histogram. It has an entropy of 4.17 compared to the other two ciphers. Playfair seems easier to break than all of them but it has a entropy of 4.42 which says it is slightly more difficult to crack so I am up in the air with this one. Caesar would seem to be the next difficult especially when I look at the histogram. It also has a entropy of 4.17. Result list below. Lab Part 2: Advance Crytography Functions Q5. For each of the......

Words: 1234 - Pages: 5

Free Essay

Lab 2

... | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after......

Words: 1139 - Pages: 5

Free Essay

Csec 620 Individual Assignment 2

...Estonia Banks Targeted University of Maryland University College CSEC 620 Individual assignment # 2 Table of Contents Introduction …………………………………………………………………………………………………………. 3 Estonia under attack……………………………………………………………………………………………….. 4 Types of attacks ……………………………………………………………………………………………………… 5 Threats actors and their motives ……………………………………………………………………………. 6 Who were responsible for the attacks ……………………………………………………………………. 7 Strategic Shifts in Response to attacks ……………………………………………………………………. 8 Conclusions ……………………………………………………………………………………………………………. 10 Introduction The Baltic state of Estonia was attacked by hackers in April of 2007. Scores of government and private sector website were shut down. Estonian’s daily activities, such as pumping gas or making withdrawals from ATM machines were severely impacted. The architecture of the Internet allowed networks of bots, called botnets, to direct millions of packets to the servers of the Estonian targets, overloading and rendering them inaccessible to visitors. Digital traffic from servers ranging all the way to Peru, Vietnam and the United States overwhelmed Estonian websites, overloading their buffers with superfluous data. At the apex of this DDoS flooding, government websites that had been receiving 1,000 visits each day were suddenly inundated with 2,000 per second (Crouch, Pg 1). No overt financial motivations were discovered as the driver of these attacks, with the principal motivation being......

Words: 2634 - Pages: 11

Premium Essay

Csec 650 Individual Assignment 2

... IA2: Business Continuity Plan for Information Technology CSEC 650 University of Maryland University College Abstract Business contingency and continuity of operations plan are vital to business, especially those reliant on digital media. Whether through nature events or the more likely interruption of computer systems and networks, a disruption of any type is a serious business concern. A disruption can harm operational revenue, services, supply-chain, and reputation. Any of the preceding effects from a disruption could possibly be severe enough to mean the end of business as a going concern. To avoid severe or long term damaging disruption, a comprehensive contingency plan can provide a guide for how resources and personnel will be allocated in the event of a crisis. Keywords: Business Continuity Plan (BCP), Information Technology, contingency plan Table of Contents Business Continuity Plans 4 Planning Steps 5 Business Impact Analysis 6 Recovery Strategies 8 Data Backup 10 IT Personnel Training 10 Alternate Site 11 Contingency Plan Development 12 Training and Testing 13 Recommended Training and Testing 14 Test Schedule 15 Summation 17 References 18 Business Continuity Plans Greater numbers of businesses now must consider the protection of their computer information systems as a vital aspect of their operations. Even as organizations became ever more reliant on computer systems over the past several decades, information technology (IT) contingency planning was......

Words: 4274 - Pages: 18

Premium Essay

Csec 630 Lab 1

...cipher in comparison to the results of the Caesar cipher? Why is this the case? The Caesar cipher was a lot easier to see the patterns of the alphabet. The frequency definitely made it easier to distinguish the usage pattern which makes it easier for decryption while the pattern is lost if it is viewed with the Vigenère. It will be easier to crack if the Caesar cipher is used compared to using the Vigenère which seems to be more difficult to crack. Q3. There is an error in the following ciphertext representation of this quote, what is it? What should the correct ciphertext be? (Hint: when using the CrypTool there are several ways to decode one that you can use is “Playfair” encipher option, the plaintext and key provided in the lab information, and DESELECTING the “separate duplicate letters only within pairs” option) SDAHFOWGRABSSRERIVBYBSCIMQTFNIVETGHBSNQCNCSDTDHBSNQCD ECNICIFCTIC Answer: The error that is included in the cipher text is written below in Blue: THE DIFXFERENCE BETWEXEN STUPIDITY AND GENIUS IS THAT GENIUS HAS ITS LISCTS The correct ciphertext is: The difference between stupidity and genius is that genius has its limits. Q4. Of the three ciphers discussed (Caesar, Vigenère, Playfair), what are their relative degree of security and why? Out of all three ciphers, the Vigenère seems to be the most secure because the two other ciphers can be broken easily using statistical analysis. For example, the Playfair makes use of a......

Words: 959 - Pages: 4

Premium Essay

Csec 630 Lab 1

...Lab Assignment #1: Introduction to Encryption Algorithms CSEC 630 University of Maryland University College Professor Jingyu Zhang 1. Which tool or technique would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The best analysis tool to break the Caesar cipher is histogram because it performs a statistical analysis on cipher text which shows the frequency of each letter used in the file. This can later be compared and matched to the frequency of letters in the English language. 2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case? Histogram simply gives the frequency of each individual letter in cipher text without taking the plaintext into consideration. Since in Caesar cipher the relationship between plaintext and cipher text is one to one, histogram is more efficient to break the cipher. Since the key in vigenere is somewhat random the histogram shown below seems random as well. 3. There is an error in the following cipher text representation of this quote, what is it? The original unencrypted message is: TH ED IF FE RE NC EB ET WE EN ST UP ID IT YA ND GE NI US IS TH AT GE NI US HA SI TS LI MI TS The original encrypted message is: THE CORRECT CIPHERTEXT SD AH FO HL AR ST RE AS YL BS CI MQ TF NI VE TG HB SN QC NC SD TD HB SN QC DE CN IC IF OT IC This is the error example: SD...

Words: 1083 - Pages: 5