Posted on: 16th Feb 2026

CP3404 Information Security Assignment Brief 2026 | James Cook University

CP3404 Assignment Brief 2026 

Overview

In this assignment, you will decrypt a given ciphertext using the specified cipher technique, documented in a report. Following the decryption process, you will create a 10-15-minute recorded tutorial presentation to teach others about the given cipher technique. This involves explaining the historical background of the cipher, its strengths and weaknesses, and a detailed, step-by-step guide on how to encode and decode messages using the cipher. This should be supported by your own decryption of the ciphertext as an example. The tutorial should also touch on potential use cases for the cipher and explain its relevance in modern cryptography.

This assignment will not only help you improve your technical understanding of cryptographic ciphers but also enhance your ability to communicate complex concept effectively to others, a valuable skill in information security. We recommend following the Assertion-Evidence approach for presentations.

Key Requirements

There are two key deliverables that you are required to produce for this assignment.

1. Ciphertext Decryption Report

  • You will be provided with details of a cipher that you must learn (e.g., Vigenère cipher, Caesar cipher, Playfair cipher, etc.) – see Appendix 1.
  • You will be given a ciphertext to decode using the above method – see Appendix 2.
  • Document your step-by-step process for decrypting the plaintext message in a detailed a clear manner, explaining each action taken, any assumptions made, and any challenges faced during the process.

2. Tutorial Presentation

Create a 10–15-minute video tutorial that should cover the following:

    1. Historical Background:
      • Provide a brief history of the cipher, including who created it, its original purpose, and any significant events or uses related to it.
    2. Strengths and Weaknesses:
      • Explain the key strengths and weaknesses of the cipher. Consider its security in the historical context versus modern cryptographic standards.
    3. Step-by-Step Encoding and Decoding:
      • Walk through the encoding and decoding process using the cipher. Be sure to use your decryption of the given ciphertext as an example, illustrating how someone would encode and decode messages using this method.
    4. Potential Use Cases:
      • Discuss the types of use cases for which the cipher might be useful, both historically and in modern cryptographic applications.
    5. Real-World Relevance:
      • Briefly touch on how this cipher (or similar ciphers) is relevant in today’s cryptographic world, including its role in understanding modern encryption methods.

Submission and Formatting Guidelines

Written Report:

    • Word count: 1,000 – 1,500 words.
    • Use clear headings and subheadings to organise the document.
    • Include images or diagrams where necessary to illustrate your points, especially to help clearly explain your decryption process.
    • Include citations for any sources used.

Video Tutorial:

    • Duration: 10 – 15 minutes.
    • Make sure your voice is clear and audible.
    • Ensure your face is included in the presentation (use a webcam).
    • Use slides and screen-sharing to illustrate your explanations.
    • Ensure that any demonstrations (e.g., step-by-step cipher encoding and decoding) are visible and easy to follow.
    • OBS Studio is a recommended software tool for recording your video.
  • Submit your written report and video tutorial to the submission link on LearnJCU.

Academic Integrity

  • This is an individual assignment. You are expected to complete this assignment independently. Any form of academic misconduct, including plagiarism and collusion, will be pursued according to the Coursework Academic Integrity Policy and Procedures.
  • Proper citations should be provided for any historical facts, sources, or content that is not your own or that you have consulted during the preparation of the assignment.

Generative Artificial Intelligence (AI) Guidelines

  • Per the subject outline, Generative AI tools are restricted in this assessment item.
  • This means that you can use Generative Artificial Intelligence (GenAI) to obtain information only. Any use of generative AI must be appropriately acknowledged and include a Declaration of AI-Generated Material (submit this with the assignment).

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

CP3404 Assignment Marking Rubric

 

 

Criterion Weight Excellent (80-100%) Good (65–79%) Satisfactory (50-64%) Poor (35-49%) Very Limited (0-34%)
Report            
Cipher 30% Decryption is Decryption is Decryption is Decryption has Decryption is
Decryption   flawless, with all mostly mostly correct several critical largely incorrect
Accuracy   steps correctly correct with but contains errors. The method or incomplete.
    applied and fully few minor some is not explained The method is
    explained. The errors. The significant clearly, with major misunderstood
    method chosen method is errors or gaps. flaws in the not applied.
    is thoroughly mostly The method is decryption process.  
    justified. justified but described but    
      may lack justification    
      detail in some could be    
      areas. stronger.    
Clarity and 20% The decryption The process is The process is The process is The process is not
Detail of   process is mostly clear, somewhat unclear and lacks explained or is
Process   extremely clear, with few gaps clear, but there detail. Several completely
    logical, and in reasoning. are a few steps are not unclear. Major
    thorough. Each The steps are unclear or explained, and the steps are missing,
    step is explained mostly well under- reasoning behind and reasoning is
    in detail, with explained, explained the choices is completely
    careful but some steps. The insufficient or absent.
    reasoning and details may reasoning missing.  
    justification. be missing or behind some    
      unclear. steps is weak or incomplete.    
Presentation            
Historical Background 10% Provides a comprehensive Provides a clear history Provides a basic history of Provides a minimal or inaccurate No or very little historical context
    and engaging of the cipher the cipher. history of the provided. The
    history of the with most key Some details cipher. Many key explanation is
    cipher, covering details. Some are missing or facts or details are vague or
    its origins, aspects may superficial. missing. inaccurate.
    significance, and be lacking or      
    historical uses in need more      
    depth. depth.      
Strengths 10% A thorough, Provide a Provides a The analysis is Analysis is
and   insightful solid analysis basic analysis superficial, with incorrect or
Weaknesses   analysis of the of strengths but lacks limited discussion missing. No
    ciphers and detailed of strengths or meaningful
    strengths and weaknesses, comparison to weaknesses. Few discussion of
    weaknesses, with some modern insights are strengths and
    with clear insightful cryptography offered, and the weaknesses.
    explanations of observations or depth in ciphers security is  
    its security features and though a few points may explaining weaknesses. not well explored.  
    historical context. lack depth.      
Criterion Weight Excellent Good Satisfactory Poor Very Limited
Encoding and Decoding

Tutorial

15% The tutorial is clear, thorough, and well-paced, demonstrating both encoding and decoding in a way that is easy to follow. The example is explained fully. The tutorial is clear and covers most steps, though some parts may need

further clarification

or be slightly rushed. The example is mostly clear.

The tutorial is somewhat

clear, but several steps or key concepts are rushed or unclear. The

example may

be confusing in parts.

The tutorial lacks clarity or important steps. The example may be confusing or incomplete. The tutorial does not fully explain encoding and decoding. The tutorial is unclear, incomplete, or missing key components. The encoding and

decoding process is not

demonstrated correctly.

Potential Use Cases and Relevance 10% Provides an excellent analysis of the ciphers use cases, both historically and in modern cryptography. Clearly connects its relevant today. Good analysis of the ciphers use cases, with some

discussion on its historical and modern relevant.

Some areas may need

more detail or clarity.

Provides a basic discussion of potential use cases but lacks depth in explaining its

historical and modern relevance.

Discussion is minimal, with few or no relevant use cases provided. Relevance to moder

cryptography is unclear.

No discussion of use cases or relevant. The content is irrelevant or missing.
Presentation

Quality

5% Presentation is professional engaging, and well-organised, using visuals effectively. The speaker is confident and maintains clear communication. Presentation is clear and engaging, with good use of visuals,

though some parts could be more polished or structured. Speaker is confident but may need improvement in delivery.

Presentation is clear but lacks engagement or structure.

Some visuals may not support the explanation effectively.

Delivery may be hesitant or unclear in parts.

Presentation is unclear or poorly organised. Few visuals are used, and the speaker may be hard to follow or unsure. Presentation is unprofessional, unclear, or difficult to follow.

Lacks engagement and has significant delivery issues.

Video and

Audio

Quality

5% High-quality audio and video with clear visuals and sound. There are no technical issues. Good quality audio and video with minor issues. Mostly clear visuals and sound, though a small part of the video may have slight issues. Acceptable quality, but there may be some technical issues that make following the presentation difficult. Poor video or audio quality, making it hard to understand the content. Several technical issues disrupt the presentation. Unacceptable quality, with major technical issues making the video unusable or incomprehensible.

 

 

Appendix 1: Vigenére cipher

Background

Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate timeframe.

Julius Caessar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows the original English alphabet and the corresponding cryptogram alphabet in Caesar cipher:

a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c
Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher.

To use mathematical notations, lets convert the letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, …, 24, 25 to a, b, …, y, z, respectively. Using this conversion, Caesar cipher can be expressed as:

C = Ek(M) = M + 3 (mod 26)

where ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘k’ is the key, ‘M’ is the message/plaintext (one may replace integer 3 by letter ‘d’).

Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are only 26 possible keys/shifts.

Vigenére Cipher

In Vigenére cipher the key is more than one letter. That is, Vigenére cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword).

Consider an example where the message/plaintext is ‘individual character’ and the keyword is ‘host’. Vigenére cipher encrypts the message as follows:

Plaintext i n d i v i d u a l c h a r a c t e r
Keyword h o s t h o s t h o s t h o s t h o s
Cryptogram p b v b c w v n h z u a h f s v a s j

That is, the first four letters of the cryptogram are computed as:
‘i’ + ‘h’ = 8 + 7 = 15 (mod 26) i.e., p
‘n’ + ‘o’ = 13 + 14 = 1 (mod 26) i.e., b
‘d’ + ‘s’ = 3 + 18 = 21 (mod 26) i.e., v
‘i’ + ‘t’ = 8 + 19 = 1 (mod 26) i.e., b

Since the plaintext is longer than the keyword, keyword is repeated until all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘i’ from the plaintext is encrypted with ‘h’, where its second and third occurrences are encrypted with the letters ‘t’ and ‘o’ respectively. That is, Vigenére cipher is a polyalphabetic substitution cipher.

To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the key-length of the cipher. This can be done using Kassiski method. The Kassiski method uses repetitions of patterns in the ciphertext to make a good guess about the key-length. For example, suppose the plaintext ‘to be or not to be’ has been enciphered using the key ‘now’, producing the ciphertext below:

Plaintext t o b e o r n o t t o b e
Keyword n o w n o w n o w n o w n
Cryptogram g c x r c n a c p g c x r

In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), where the distance between these repetitions (i.e., the number of characters form the first letter of the pattern in its first occurrence to the first letter of its second occurrence) is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigenére cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Note that for longer cryptograms, we can look for multiple repeating patterns of different characters and calculate the distances between these repeating patterns. The greatest common divisor of those distances may give an indication of the possible key-length.

Once we have the key length (k), we split the cryptogram into k cryptograms. For the current example, assuming that the key length is 3, we split the cryptogram into three cryptograms. That is, the 1st, 4th, 7th, … characters of the cryptogram are the result of encrypting the 1st, 4th, 7th, … characters of the plaintext with the first letter of the keyword (in other words, they are shifted with the same number, as in the Caesar cipher). Similarly, the 2nd, 5th, 8th, … characters are the result of encrypting the corresponding letters in the plaintext with the second letter of the key, and the same for the third. That is, this Vigenére cipher is a combination of 3 Caesar ciphers, where the cryptogram of each Caesar cipher is given as below:

Cryptogram 1: g r a g r
Cryptogram 2: c c c c
Cryptogram 3: x n p r

To break each of these Caesar ciphers, we can use the letter frequency in the English text. As shown in Figure 2, ‘e’ is the most common letter used in English texts. That is:

In Cryptogram 1, we can guess that ‘g’ or ‘r’ could be the corresponding letter to ‘e’ in the plaintext.
If ‘g’ corresponds to ‘e’, then the first letter of the key should be ‘g’ – ‘e’ = 6 – 4 = 2, which is ‘c’.
If ‘r’ corresponds to ‘e’, then the first letter of the key should be ‘r’ – ‘e’ = 17 – 4 = 13, which is ‘n’.

In Cryptogram 2, we can guess that ‘c’ is the corresponding letter to ‘e’ in the plaintext.
If ‘c’ corresponds to ‘e’, then the second letter of the key could be ‘c’ – ‘e’ = 2 – 4 = -2 = 24 (calculate mod 26), which is ‘y’.

In Cryptogram 3, each character appears only once, and thus letter frequency does not work.

Remark: This example is simply to show the mechanism of the Kassiski attack. The attack is very effective for large cryptograms (e.g., the size of the cryptograms given in this assignment). You should always consider other potential letters based on letter frequency to determine the correct letter in the keyword (i.e., the most repeated letters won’t always be ‘e’).

 CP3404 Letter frequencies in English texts

Figure 2: Letter frequencies in English texts.

Appendix 2: Ciphertexts

The following are 10 cryptograms that are created by the Vigenere cipher, where the plaintext is complete English text, and the keyword is a meaningful English word. You are required to decipher the cryptogram that matches with your Student ID.

Cryptogram for whom their Student-ID is XXXXXXX7

xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx

Buy Custom Answer of This Assessment & Raise Your Grades

Tags:- CP3404 JCU
Answer
SC1007 Data Structures & Algorithms Assignment Question 2026 | NTU
No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total
    Free

New Special Offer

Get 30% Off

Hire an Assignment Helper and Earn A+ Grade

UP TO 15 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now

Facing Issues with Assignments? Talk to Our Experts Now! Download Our App Now!