CP3404 Information Security Assignment Brief 2026 | James Cook University
| University | James Cook University (JCU) |
| Subject | CP3404 Information Security |
CP3404 Assignment Brief 2026
Overview
In this assignment, you will decrypt a given ciphertext using the specified cipher technique, documented in a report. Following the decryption process, you will create a 10-15-minute recorded tutorial presentation to teach others about the given cipher technique. This involves explaining the historical background of the cipher, its strengths and weaknesses, and a detailed, step-by-step guide on how to encode and decode messages using the cipher. This should be supported by your own decryption of the ciphertext as an example. The tutorial should also touch on potential use cases for the cipher and explain its relevance in modern cryptography.
This assignment will not only help you improve your technical understanding of cryptographic ciphers but also enhance your ability to communicate complex concept effectively to others, a valuable skill in information security. We recommend following the Assertion-Evidence approach for presentations.
Key Requirements
There are two key deliverables that you are required to produce for this assignment.
1. Ciphertext Decryption Report
- You will be provided with details of a cipher that you must learn (e.g., Vigenère cipher, Caesar cipher, Playfair cipher, etc.) – see Appendix 1.
- You will be given a ciphertext to decode using the above method – see Appendix 2.
- Document your step-by-step process for decrypting the plaintext message in a detailed a clear manner, explaining each action taken, any assumptions made, and any challenges faced during the process.
2. Tutorial Presentation
Create a 10–15-minute video tutorial that should cover the following:
-
- Historical Background:
- Provide a brief history of the cipher, including who created it, its original purpose, and any significant events or uses related to it.
- Strengths and Weaknesses:
- Explain the key strengths and weaknesses of the cipher. Consider its security in the historical context versus modern cryptographic standards.
- Step-by-Step Encoding and Decoding:
- Walk through the encoding and decoding process using the cipher. Be sure to use your decryption of the given ciphertext as an example, illustrating how someone would encode and decode messages using this method.
- Potential Use Cases:
- Discuss the types of use cases for which the cipher might be useful, both historically and in modern cryptographic applications.
- Real-World Relevance:
- Briefly touch on how this cipher (or similar ciphers) is relevant in today’s cryptographic world, including its role in understanding modern encryption methods.
- Historical Background:
Submission and Formatting Guidelines
Written Report:
-
- Word count: 1,000 – 1,500 words.
- Use clear headings and subheadings to organise the document.
- Include images or diagrams where necessary to illustrate your points, especially to help clearly explain your decryption process.
- Include citations for any sources used.
Video Tutorial:
-
- Duration: 10 – 15 minutes.
- Make sure your voice is clear and audible.
- Ensure your face is included in the presentation (use a webcam).
- Use slides and screen-sharing to illustrate your explanations.
- Ensure that any demonstrations (e.g., step-by-step cipher encoding and decoding) are visible and easy to follow.
- OBS Studio is a recommended software tool for recording your video.
- Submit your written report and video tutorial to the submission link on LearnJCU.
Academic Integrity
- This is an individual assignment. You are expected to complete this assignment independently. Any form of academic misconduct, including plagiarism and collusion, will be pursued according to the Coursework Academic Integrity Policy and Procedures.
- Proper citations should be provided for any historical facts, sources, or content that is not your own or that you have consulted during the preparation of the assignment.
Generative Artificial Intelligence (AI) Guidelines
- Per the subject outline, Generative AI tools are restricted in this assessment item.
- This means that you can use Generative Artificial Intelligence (GenAI) to obtain information only. Any use of generative AI must be appropriately acknowledged and include a Declaration of AI-Generated Material (submit this with the assignment).
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
CP3404 Assignment Marking Rubric
| Criterion | Weight | Excellent (80-100%) | Good (65–79%) | Satisfactory (50-64%) | Poor (35-49%) | Very Limited (0-34%) |
| Report | ||||||
| Cipher | 30% | Decryption is | Decryption is | Decryption is | Decryption has | Decryption is |
| Decryption | flawless, with all | mostly | mostly correct | several critical | largely incorrect | |
| Accuracy | steps correctly | correct with | but contains | errors. The method | or incomplete. | |
| applied and fully | few minor | some | is not explained | The method is | ||
| explained. The | errors. The | significant | clearly, with major | misunderstood | ||
| method chosen | method is | errors or gaps. | flaws in the | not applied. | ||
| is thoroughly | mostly | The method is | decryption process. | |||
| justified. | justified but | described but | ||||
| may lack | justification | |||||
| detail in some | could be | |||||
| areas. | stronger. | |||||
| Clarity and | 20% | The decryption | The process is | The process is | The process is | The process is not |
| Detail of | process is | mostly clear, | somewhat | unclear and lacks | explained or is | |
| Process | extremely clear, | with few gaps | clear, but there | detail. Several | completely | |
| logical, and | in reasoning. | are a few | steps are not | unclear. Major | ||
| thorough. Each | The steps are | unclear or | explained, and the | steps are missing, | ||
| step is explained | mostly well | under- | reasoning behind | and reasoning is | ||
| in detail, with | explained, | explained | the choices is | completely | ||
| careful | but some | steps. The | insufficient or | absent. | ||
| reasoning and | details may | reasoning | missing. | |||
| justification. | be missing or | behind some | ||||
| unclear. | steps is weak or incomplete. | |||||
| Presentation | ||||||
| Historical Background | 10% | Provides a comprehensive | Provides a clear history | Provides a basic history of | Provides a minimal or inaccurate | No or very little historical context |
| and engaging | of the cipher | the cipher. | history of the | provided. The | ||
| history of the | with most key | Some details | cipher. Many key | explanation is | ||
| cipher, covering | details. Some | are missing or | facts or details are | vague or | ||
| its origins, | aspects may | superficial. | missing. | inaccurate. | ||
| significance, and | be lacking or | |||||
| historical uses in | need more | |||||
| depth. | depth. | |||||
| Strengths | 10% | A thorough, | Provide a | Provides a | The analysis is | Analysis is |
| and | insightful | solid analysis | basic analysis | superficial, with | incorrect or | |
| Weaknesses | analysis of the | of strengths | but lacks | limited discussion | missing. No | |
| cipher’s | and | detailed | of strengths or | meaningful | ||
| strengths and | weaknesses, | comparison to | weaknesses. Few | discussion of | ||
| weaknesses, | with some | modern | insights are | strengths and | ||
| with clear | insightful | cryptography | offered, and the | weaknesses. | ||
| explanations of | observations | or depth in | cipher’s security is | |||
| its security features and | though a few points may | explaining weaknesses. | not well explored. | |||
| historical context. | lack depth. |
| Criterion | Weight | Excellent | Good | Satisfactory | Poor | Very Limited |
| Encoding and Decoding
Tutorial |
15% | The tutorial is clear, thorough, and well-paced, demonstrating both encoding and decoding in a way that is easy to follow. The example is explained fully. | The tutorial is clear and covers most steps, though some parts may need
further clarification or be slightly rushed. The example is mostly clear. |
The tutorial is somewhat
clear, but several steps or key concepts are rushed or unclear. The example may be confusing in parts. |
The tutorial lacks clarity or important steps. The example may be confusing or incomplete. The tutorial does not fully explain encoding and decoding. | The tutorial is unclear, incomplete, or missing key components. The encoding and
decoding process is not demonstrated correctly. |
| Potential Use Cases and Relevance | 10% | Provides an excellent analysis of the cipher’s use cases, both historically and in modern cryptography. Clearly connects its relevant today. | Good analysis of the cipher’s use cases, with some
discussion on its historical and modern relevant. Some areas may need more detail or clarity. |
Provides a basic discussion of potential use cases but lacks depth in explaining its
historical and modern relevance. |
Discussion is minimal, with few or no relevant use cases provided. Relevance to moder
cryptography is unclear. |
No discussion of use cases or relevant. The content is irrelevant or missing. |
| Presentation
Quality |
5% | Presentation is professional engaging, and well-organised, using visuals effectively. The speaker is confident and maintains clear communication. | Presentation is clear and engaging, with good use of visuals,
though some parts could be more polished or structured. Speaker is confident but may need improvement in delivery. |
Presentation is clear but lacks engagement or structure.
Some visuals may not support the explanation effectively. Delivery may be hesitant or unclear in parts. |
Presentation is unclear or poorly organised. Few visuals are used, and the speaker may be hard to follow or unsure. | Presentation is unprofessional, unclear, or difficult to follow.
Lacks engagement and has significant delivery issues. |
| Video and
Audio Quality |
5% | High-quality audio and video with clear visuals and sound. There are no technical issues. | Good quality audio and video with minor issues. Mostly clear visuals and sound, though a small part of the video may have slight issues. | Acceptable quality, but there may be some technical issues that make following the presentation difficult. | Poor video or audio quality, making it hard to understand the content. Several technical issues disrupt the presentation. | Unacceptable quality, with major technical issues making the video unusable or incomprehensible. |
Appendix 1: Vigenére cipher
Background
Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from corresponding ciphertext within an appropriate timeframe.
Julius Caessar used a cipher which moved each letter of the alphabet to the letter three to the left in the predetermined order of the letters of the alphabet. Figure 1 shows the original English alphabet and the corresponding cryptogram alphabet in Caesar cipher:
a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c
Figure 1: English alphabet letter and their corresponding cryptograms in the Caesar cipher.
To use mathematical notations, lets convert the letters of the alphabet to integers. The most natural conversion is to assign to each letter an integer which indicates the position of the letter in the alphabet. That is, assign 0, 1, …, 24, 25 to a, b, …, y, z, respectively. Using this conversion, Caesar cipher can be expressed as:
C = Ek(M) = M + 3 (mod 26)
where ‘C’ is the cryptogram, ‘E’ is the encryption algorithm, ‘k’ is the key, ‘M’ is the message/plaintext (one may replace integer 3 by letter ‘d’).
Caesar cipher is from the family of shift ciphers, in which the cryptogram is a shifted version of the original alphabet. Cryptanalysis of the Caesar (and all shift ciphers) is easy, because there are only 26 possible keys/shifts.
Vigenére Cipher
In Vigenére cipher the key is more than one letter. That is, Vigenére cipher can be considered as a combination of n shift ciphers, where n is the key-length (i.e., the number of letters in the keyword).
Consider an example where the message/plaintext is ‘individual character’ and the keyword is ‘host’. Vigenére cipher encrypts the message as follows:
Plaintext i n d i v i d u a l c h a r a c t e r
Keyword h o s t h o s t h o s t h o s t h o s
Cryptogram p b v b c w v n h z u a h f s v a s j
That is, the first four letters of the cryptogram are computed as:
‘i’ + ‘h’ = 8 + 7 = 15 (mod 26) i.e., p
‘n’ + ‘o’ = 13 + 14 = 1 (mod 26) i.e., b
‘d’ + ‘s’ = 3 + 18 = 21 (mod 26) i.e., v
‘i’ + ‘t’ = 8 + 19 = 1 (mod 26) i.e., b
Since the plaintext is longer than the keyword, keyword is repeated until all letters of the plaintext are encrypted. As it can be seen, a particular letter of the plaintext may be encrypted with different letters from the keyword. For example, the first occurrence of letter ‘i’ from the plaintext is encrypted with ‘h’, where its second and third occurrences are encrypted with the letters ‘t’ and ‘o’ respectively. That is, Vigenére cipher is a polyalphabetic substitution cipher.
To break a polyalphabetic substitution cipher, the cryptanalyst must first determine the key-length of the cipher. This can be done using Kassiski method. The Kassiski method uses repetitions of patterns in the ciphertext to make a good guess about the key-length. For example, suppose the plaintext ‘to be or not to be’ has been enciphered using the key ‘now’, producing the ciphertext below:
Plaintext t o b e o r n o t t o b e
Keyword n o w n o w n o w n o w n
Cryptogram g c x r c n a c p g c x r
In this cryptogram, a repeated pattern is g c x r (i.e., g c x r c n a c p g c x r), where the distance between these repetitions (i.e., the number of characters form the first letter of the pattern in its first occurrence to the first letter of its second occurrence) is 9. This could be the sign in which the same letters from plaintext is encrypted with the same letters from the keyword. Since in Vigenére cipher the keyword is repeated, the key-length is probably 9 or a divisor of 9 (i.e., 3, because 9 has no other divisor). Note that for longer cryptograms, we can look for multiple repeating patterns of different characters and calculate the distances between these repeating patterns. The greatest common divisor of those distances may give an indication of the possible key-length.
Once we have the key length (k), we split the cryptogram into k cryptograms. For the current example, assuming that the key length is 3, we split the cryptogram into three cryptograms. That is, the 1st, 4th, 7th, … characters of the cryptogram are the result of encrypting the 1st, 4th, 7th, … characters of the plaintext with the first letter of the keyword (in other words, they are shifted with the same number, as in the Caesar cipher). Similarly, the 2nd, 5th, 8th, … characters are the result of encrypting the corresponding letters in the plaintext with the second letter of the key, and the same for the third. That is, this Vigenére cipher is a combination of 3 Caesar ciphers, where the cryptogram of each Caesar cipher is given as below:
Cryptogram 1: g r a g r
Cryptogram 2: c c c c
Cryptogram 3: x n p r
To break each of these Caesar ciphers, we can use the letter frequency in the English text. As shown in Figure 2, ‘e’ is the most common letter used in English texts. That is:
In Cryptogram 1, we can guess that ‘g’ or ‘r’ could be the corresponding letter to ‘e’ in the plaintext.
If ‘g’ corresponds to ‘e’, then the first letter of the key should be ‘g’ – ‘e’ = 6 – 4 = 2, which is ‘c’.
If ‘r’ corresponds to ‘e’, then the first letter of the key should be ‘r’ – ‘e’ = 17 – 4 = 13, which is ‘n’.
In Cryptogram 2, we can guess that ‘c’ is the corresponding letter to ‘e’ in the plaintext.
If ‘c’ corresponds to ‘e’, then the second letter of the key could be ‘c’ – ‘e’ = 2 – 4 = -2 = 24 (calculate mod 26), which is ‘y’.
In Cryptogram 3, each character appears only once, and thus letter frequency does not work.
Remark: This example is simply to show the mechanism of the Kassiski attack. The attack is very effective for large cryptograms (e.g., the size of the cryptograms given in this assignment). You should always consider other potential letters based on letter frequency to determine the correct letter in the keyword (i.e., the most repeated letters won’t always be ‘e’).

Figure 2: Letter frequencies in English texts.
Appendix 2: Ciphertexts
The following are 10 cryptograms that are created by the Vigenere cipher, where the plaintext is complete English text, and the keyword is a meaningful English word. You are required to decipher the cryptogram that matches with your Student ID.
Cryptogram for whom their Student-ID is XXXXXXX7
xkvdxvokmlavgkigbcdlfkgscvckyiewixqecbzoytxcukbrwtwuvggykhxquavfhkaupkuqfticawunvzxvizlzmgf mycxrzctqavilvkugeuvrxhlwtzbjmbpobcjrgrhakausguhbwxwnwbetketahgkdigkvzwklzabrzwcetaokiazq hxrniscmtmguekloanwtuekwnqrhklslmgmzhtedxhobulxirbxuzalaionknecjlrnwwzzclxxivhoxngfrcretlhjx uekmisdwvrmxvkvqogvdysxpkkfzlbxgzaageooezqqflyetpywhglkekijiulkfnzwkvuwhwdbwiqrdbeetrjmhx btixrigyamyigloacjfpigejlklbfnmsnquebcimexgcuazeoismpllwrxhkzkudnalevivjheoyxnmcjmjaghgvgfezg axkvgvwvsiszqohevmxrzqpykvfhvsavztkiftxwxwwkhxilnkubvnvcunigovrgqkvvsgupksswvwwieemmqqm lkoeixipuxyilguuoamdegxzwgvntammuvemekukigvflavakxymcjgvdamsitwilttxowpslfnxslbjwffsmtxwijxj sbzkzwdxishjnqulbdeyvklgjbtkmlkotwtkseimieqbjmtvqmftryilpkifwkjhbtovdsmklxetljalmilmuvhgkrmhh kzpwywivmkvvkmrtx
Buy Custom Answer of This Assessment & Raise Your Grades
- BME317 Biomedical Devices Innovation Tutor-Marked Assignment Questions 2026 | SUSS
- MKT362 Pricing End-of-Course Assessment Question 2026 | SUSS
- PSY 101 Introduction to Cultural Psychology Assessment 2026 | MU Singapore
- MKT371 Customer Insights and Analytics End-of-Course Assessment Question 2026 | SUSS
- MN3496K Clusters, Small Business and International Entrepreneurship Assignment 2026 |
- BM4708 Managing Hybrid Events Individual Assignment 3 2026 | Nanyang Polytechnic
- TSL561 Pedagogical Grammar End-of-Course Assessment 2026 | SUSS
- FMT302 Operation and Maintenance of Building Services TMA 02 | SUSS
- SM9532 Strategic Frameworks and Cultural Contexts in International Management Assessment Brief 2026 | NU
- SC1007 Data Structures & Algorithms Assignment Question 2026 | NTU
