DataNetworkSecurity_HW1.pdf

‫ﺑﻪ ﻧﺎﻡ ﺧﺪﺍ‬
‫ﺩﺍﻧﺸﮑﺪﻩ ﻣﻬﻨﺪﺳﻲ ﮐﺎﻣﭙﻴﻮﺗﺮ‬
‫ﺍﻣﻨﻴﺖ ﺩﺍﺩﻩ ﻫﺎ ﻭ ﺷﺒﮑﻪ‬
‫ﺗﻤﺮﻳﻦ ﺳﺮي ﺍﻭﻝ‬
‫‪ ۳۰‬ﻣﻬﺮ ‪۹۱‬‬
‫ﺗﻮﺟﻪ‪ : ‬ﺑﺮﺍي ﺁﮔﺎﻫﻲ ﺍﺯ ﻧﺤﻮﻩ ي ﺗﺤﻮﻳﻞ ﭘﺎﺳﺦ ﺗﻤﺮﻳﻦ ﻫﺎ ﺑﻪ ﻓﺎﻳﻞ ‪ DeliveryGuide.pdf‬ﻣﺮﺍﺟﻌﻪ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪ .۱‬ﻳﮏ ﺩﺭﺧﺖ ﺣﻤﻠﻪ‪ ١‬ﻳﮏ ﺩﺭﺧﺖ ﺷﺎﻣﻞ ﮔﺮﻩ ﻫﺎي ‪ AND‐OR‬ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺩﺭﺧﺖ ﻫﺮ ﮔﺮﻩ ﺑﺎ ﻳﮏ ﻫﺪﻑ ﺍﻣﻨﻴﺘﻲ ﻧﺎﻡ ﮔﺬﺍﺭي ﺷﺪﻩ ﺍﺳﺖ‪ .‬ﺭﻳﺸﻪ‬
‫ﻧﺸﺎﻧﮕﺮ ﻫﺪﻑ ﻧﻬﺎﻳﻲ ﻣﻬﺎﺟﻢ ﻣﻲ ﺑﺎﺷﺪ) ﻧﻘﺾ ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﺍﻣﻨﻴﺘﻲ ‪ ‬ﻣﺤﺮﻣﺎﻧﮕﻲ‪ ،‬ﺻﺤﺖ ﻭ ﺩﺳﺘﺮﺱ ﭘﺬﻳﺮي( ‪ .‬ﺑﭽﻪ ﻫﺎي ﻫﺮ ﮔﺮﻩ ﺯﻳﺮﺍﻫﺪﺍﻓﻲ ﺭﺍ‬
‫ﻣﺸﺨﺺ ﻣﻲ ﮐﻨﻨﺪ ﮐﻪ ﻣﻬﺎﺟﻢ ﺍﺯ ﻃﺮﻳﻖ ﺁﻧﻬﺎ ﻣﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻫﺪﻑ ﭘﺪﺭ ﺩﺳﺖ ﻳﺎﺑﺪ‪ .‬ﺍﮔﺮ ﭘﺪﺭ ﻳﮏ ﮔﺮﻩ ‪ OR‬ﺑﺎﺷﺪ ﺭﺳﻴﺪﻥ ﺑﻪ ﻳﮑﻲ ﺍﺯ ﺍﻫﺪﺍﻑ ﻓﺮﺯﻧﺪ ﺑﺮﺍي‬
‫ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﻫﺪﻑ ﭘﺪﺭ ﮐﺎﻓﻲ ﺍﺳﺖ‪ .‬ﺍﮔﺮ ﮔﺮﻩ ﭘﺪﺭ ﻳﮏ ﮔﺮﻩ ‪ AND‬ﺑﺎﺷﺪ ﺑﺮﺍي ﺭﺳﻴﺪﻥ ﺑﻪ ﻳﮏ ﮔﺮﻩ ﭘﺪﺭ ﺑﺎﻳﺪ ﺑﻪ ﻫﻤﻪ ي ﺍﻫﺪﺍﻑ ﻓﺮﺯﻧﺪﺵ ﺭﺳﻴﺪﻩ ﺑﺎﺷﻴﺪ‪.‬‬
‫ﺍﺭﺗﻔﺎﻉ ﺩﺭﺧﺖ ﺗﺎ ﺣﺪي ﭘﻴﺶ ﻣﻲ ﺭﻭﺩ ﮐﻪ ﺑﻪ ﻳﮏ ﻫﺪﻑ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﺩﺭ ﺑﺮﮒ ﻫﺎ ﺑﺮﺳﻴﻢ‪ .‬ﻫﺪﻑ ﻗﺎﺑﻞ ﻗﺒﻮﻝ‪ ،‬ﻳﮏ ﻫﺪﻑ ﺳﺎﺩﻩ ﻣﻲ ﺑﺎﺷﺪ ﮐﻪ ﺳﺨﺘﻲ‬
‫ﺩﺳﺘﻴﺎﺑﻲ ﺑﻪ ﺁﻥ ﻗﺎﺑﻞ ﻣﺤﺎﺳﺒﻪ ﺑﺎﺷﺪ‪.‬‬
‫ﺑﺮﺍي ﺍﻃﻼﻋﺎﺕ ﺑﻴﺸﺘﺮ ﺩﺭ ﻣﻮﺭﺩ ﺩﺭﺧﺖ ﺣﻤﻠﻪ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﻪ ﻟﻴﻨﮏ ﺯﻳﺮ ﻣﺮﺍﺟﻌﻪ ﮐﻨﻴﺪ‪.‬‬
‫‪http://www.schneier.com/paper‐attacktrees‐ddj‐ft.html#rf2 ‬‬
‫ﺍﻟﻒ‪ .‬ﻫﺪﻑ ﻧﻬﺎﻳﻲ ﺷﻤﺎ ﺍﺭﺳﺎﻝ ﻳﮏ ﺍﻳﻤﻴﻞ ﺟﻌﻠﻲ ﺑﺮﺍي ﻋﻠﻲ)ﺩﺳﺘﻴﺎﺭ ﺩﺭﺱ ﺍﻣﻨﻴﺖ ﺷﺒﮑﻪ( ﺍﺯ ﺳﻮي ﺣﺴﺎﻡ)ﺩﺳﺘﻴﺎﺭ ﺩﻳﮕﺮ ﺩﺭﺱ( ﻣﻲ ﺑﺎﺷﺪ‪ ،‬ﺑﻪ ﻃﻮﺭي ﮐﻪ‬
‫ﺣﺴﺎﻡ ﺍﺯ ﺍﺭﺳﺎﻝ ﺍﻳﻤﻴﻞ ﺑﻲ ﺧﺒﺮ ﺑﺎﺷﺪ‪ .‬ﻓﺮﺽ ﮐﻨﻴﺪ ﻣﻴﻞ ﺳﺮﻭﺭي ﮐﻪ ﻋﻠﻲ ﻭ ﺣﺴﺎﻡ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﻨﺪ ﺍﺯ ﭘﺮﻭﺗﮑﻞ ‪ DES‬ﺑﺎ ﻃﻮﻝ ﮐﻠﻴﺪ ‪ ۵۶‬ﺑﻴﺘﻲ ﺑﺮﺍي‬
‫ﺭﻣﺰﮔﺬﺍﺭي ﺍﻳﻤﻴﻞ ﻫﺎ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ‪ .‬ﺩﺭﺧﺖ ﺍﻳﻦ ﺣﻤﻠﻪ ﺭﺍ ﺭﺳﻢ ﮐﻨﻴﺪ‪ .‬ﺑﺮﺍي ﻫﺮﻳﮏ ﺍﺯ ﺍﻫﺪﺍﻑ ﺍﺻﻠﻲ ‪ ،‬ﺯﻳﺮﺍﻫﺪﺍﻑ ﻣﺸﺨﺺ ﻭ ﻗﺎﺑﻞ ﻗﺒﻮﻝ ﻃﺮﺍﺣﻲ‬
‫ﮐﻨﻴﺪ‪ .‬ﺑﻪ ﻃﻮﺭ ﻣﺜﺎﻝ ﻳﮏ ﺭﺍﻩ ﺑﺮﺍي ﺍﺭﺳﺎﻝ ﺍﻳﻤﻴﻞ ﺍﺯ ﺳﻮي ﺣﺴﺎﻡ ‪ ،‬ﺯﻳﺮ ﻧﻈﺮﮔﺮﻓﺘﻦ ﺍﻭ ﻭ ﺑﻪ ﺧﺎﻃﺮ ﺳﭙﺮﺩﻥ ﺭﻣﺰ ﻋﺒﻮﺭ ﺍﻭ ﺩﺭ ﻫﻨﮕﺎﻡ ﻭﺭﻭﺩ ﺑﻪ ﻣﻴﻞ ﺳﺮﻭﺭ ﻣﻲ‬
‫ﺑﺎﺷﺪ‪.‬‬
‫‪ ‬‬
‫‪ Attack Tree ‬‬
‫‪1‬‬
‫ﺏ‪ .‬ﻭﻗﺘﻲ ﺷﻤﺎ ﻳﮏ ﺩﺭﺧﺖ ﺣﻤﻠﻪ ﻃﺮﺍﺣﻲ ﮐﻨﻴﺪ ﮐﺎﺭﻫﺎي ﺟﺎﻟﺐ ﺯﻳﺎﺩي ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺑﺎ ﺁﻥ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ ﺑﻪ ﻋﻨﻮﺍﻥ ﻣﺜﺎﻝ ﺍﮔﺮ ﺷﻤﺎ ﺩﺭ ﻫﺮ ﮔﺮﻩ ﻫﺰﻳﻨﻪ ي‬
‫ﺭﺳﻴﺪﻥ ﺑﻪ ﺁﻥ ﻫﺪﻑ ﺭﺍ ﻣﺸﺨﺺ ﮐﻨﻴﺪ‪ ،‬ﺑﺎ ﺟﻤﻊ ﺯﺩﻥ ﻣﻘﺎﺩﻳﺮ ﻫﺰﻳﻨﻪ ي ﻓﺮﺯﻧﺪﺍﻥ ﺑﺮﺍي ﮔﺮﻩ ﻫﺎي ‪ AND ‬ﻭ ﺩﺭ ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻓﺮﺯﻧﺪ ﺑﺎ ﮐﻤﺘﺮﻳﻦ ﻫﺰﻳﻨﻪ‬
‫ﺑﺮﺍي ﮔﺮﻩ ﻫﺎي ‪ OR‬ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻫﺰﻳﻨﻪ ي ﻳﮏ ﺣﻤﻠﻪ ﻣﻮﻓﻖ ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﮐﻨﻴﺪ‪.‬‬
‫ﺍﺧﺘﺼﺎﺹ ﺩﻫﻴﺪ‪ .‬ﺩﺭﺍﻳﻦ ﻓﺮﻣﻮﻝ ‪ t‬ﺯﻣﺎﻥ ﻻﺯﻡ ﺑﺮﺍي ﺭﺳﻴﺪﻥ ﺑﻪ ﻫﺪﻑ ﻭ ‪ p‬ﺍﺣﺘﻤﺎﻝ‬
‫ﺑﻪ ﻫﺮ ﮔﺮﻩ ﻳﮏ ﻫﺰﻳﻨﻪ ي ﺗﻘﺮﻳﺒﻲ ﻣﻄﺎﺑﻖ ﺑﺎ ﻓﺮﻣﻮﻝ‬
‫‪1‬‬
‫ﻣﻮﻓﻘﻴﺖ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﺑﺮﺍي ﻣﺜﺎﻝ ﺯﻣﺎﻥ ﻻﺯﻡ ﺑﺮﺍي ﺯﻳﺮﻧﻈﺮ ﮔﺮﻓﺘﻦ ﺣﺴﺎﻡ ‪ ۸‬ﺳﺎﻋﺖ ﻣﻲ ﺑﺎﺷﺪ) ﺗﺎ ﻭﻗﺘﻲ ﮐﻪ ﺍﻭ ﺭﻣﺰﻋﺒﻮﺭ ﺧﻮﺩ ﺭﺍ ﺩﺭ ﻟﭗ ﺗﺎﭘﺶ ﻭﺍﺭﺩ ﻣﻲ‬
‫ﮐﻨﺪ!( ﻭ ﺍﺣﺘﻤﺎﻝ ﻣﻮﻓﻘﻴﺖ ﺩﺭ ﺗﺸﺨﻴﺺ ﺭﻣﺰ ﺍﻭ ﻣﺜﻼ ‪ ۵۰‬ﺩﺭﺻﺪ ﻣﻲ ﺑﺎﺷﺪ ﺩﺭ ﺍﻳﻦ ﺻﻮﺭﺕ ﻫﺰﻳﻨﻪ ي ﺭﺳﻴﺪﻥ ﺑﻪ ﺍﻳﻦ ﻫﺪﻑ‬
‫‪16‬‬
‫‪0.5‬‬
‫‪8 1‬‬
‫‪1‬‬
‫ﻣﻲ ﺑﺎﺷﺪ‪.‬‬
‫ﻫﺰﻳﻨﻪ ي ﮐﻠﻲ ﺍﺭﺳﺎﻝ ﺍﻳﻤﻴﻞ ﺍﺯ ﺳﻮي ﺣﺴﺎﻡ ﺑﺮﺍي ﻋﻠﻲ ) ﺍﻟﺒﺘﻪ ﺑﺪﻭﻥ ﺍﻃﻼﻉ ﺣﺴﺎﻡ( ﺭﺍ ﻣﺤﺎﺳﺒﻪ ﮐﻨﻴﺪ‪.‬‬
‫ﺝ‪ .‬ﻳﮏ ﭘﻴﺸﻨﻬﺎﺩ ﺳﺎﺯﻧﺪﻩ ﺑﺮﺍي ﺍﻣﻦ ﺗﺮ ﮐﺮﺩﻥ ﺗﺒﺎﺩﻻﺕ ﺍﻳﻤﻴﻞ ﺑﻴﻦ ﻋﻠﻲ ﻭ ﺣﺴﺎﻡ ﺍﺭﺍﺋﻪ ﮐﻨﻴﺪ‪.‬‬
‫ﺩ‪ .‬ﺑﺮ ﺍﺳﺎﺱ ﺗﻐﻴﻴﺮ ﭘﻴﺸﻨﻬﺎﺩي ﺧﻮﺩﺗﺎﻥ )ﺩﺭ ﻗﺴﻤﺖ ﺝ( ﺩﺭﺧﺖ ﺣﻤﻠﻪ ﺟﺪﻳﺪ ﺭﺍ ﺭﺳﻢ ﮐﻨﻴﺪ ﻭ ﺑﺮﺍﺳﺎﺱ ﺁﻥ ﻣﻘﺪﺍﺭ ﺍﻓﺰﺍﻳﺶ ﺍﻣﻨﻴﺘﻲ ﺭﺍ ﮐﻪ ﺗﻐﻴﻴﺮ‬
‫ﭘﻴﺸﻨﻬﺎﺩي ﺷﻤﺎ ﺍﻳﺠﺎﺩ ﻣﻲ ﮐﻨﺪ‪ ،‬ﻣﺤﺎﺳﺒﻪ ﮐﻨﻴﺪ‪.‬‬
‫‪ ‬‬
‫‪ .۲‬ﺍﻟﻒ‪ .‬ﻳﮏ ﭘﻴﺎﺩﻩ ﺳﺎﺯي ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ DES‬ﺑﻴﺎﺑﻴﺪ‪ ) .‬ﺑﺮﺍي ﻣﺜﺎﻝ ﺩﺭ ﭼﻬﺎﺭ ﭼﻮﺏ ‪ .NET‬ﻭ ‪ Java‬ﭘﻴﺎﺩﻩ ﺳﺎﺯي ﻫﺎﻳﻲ ﺑﺮﺍي ﺍﻳﻦ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻭﺟﻮﺩ ﺩﺍﺭﺩ(‬
‫ﺏ‪ .‬ﺍﺛﺮ ﺑﻬﻤﻨﻲ‪ ٢‬ﺭﺍ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ DES‬ﺍﻣﺘﺤﺎﻥ ﮐﻨﻴﺪ‪ .‬ﺑﺮﺍي ﺍﻳﻦ ﮐﺎﺭ ﻳﮏ ﺑﻴﺖ ﺍﺯ ﺑﻼﮎ ﻭﺭﻭﺩي ﺭﺍ ﺗﻐﻴﻴﺮ ﺩﺍﺩﻩ ﻭ ﺗﻌﺪﺍﺩ ﺑﻴﺖ ﻫﺎﻳﻲ ﮐﻪ ﺩﺭ ﺑﻠﻮﮎ ﺭﻣﺰ ﺷﺪﻩ‬
‫ي ﺧﺮﻭﺟﻲ ﺗﻐﻴﻴﺮ ﻣﻲ ﮐﻨﻨﺪ ﺭﺍ ﮔﺰﺍﺭﺵ ﮐﻨﻴﺪ‪.‬‬
‫ﺝ‪ .‬ﻳﮏ ﭘﻴﺎﺩﻩ ﺳﺎﺯي ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ AES‬ﭘﻴﺪﺍ ﮐﻨﻴﺪ ﻭ ﺍﺛﺮ ﺑﻬﻤﻨﻲ ﺭﺍ ﺩﺭ ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ AES‬ﺗﺴﺖ ﮐﻨﻴﺪ‪.‬‬
‫ﺩ‪ .‬ﺑﺎ ﺭﻣﺰﻧﮕﺎﺭي ﻭ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻳﮏ ﭘﻴﻐﺎﻡ ﺑﺎ ﻃﻮﻝ ﻣﺸﺨﺺ ) ﺗﻘﺮﻳﺒﺎ ‪ (1MB‬ﮔﺬﺭﺩﻫﻲ‪ ٣‬ﺍﻟﮕﻮﺭﻳﺘﻢ ‪ DES‬ﺩﺭ ﻣﺪﻫﺎي ﮐﺎﺭي ‪ ECB‬ﻭ ‪ CBC‬ﺭﺍ ﺑﺎﻫﻢ‬
‫ﻣﻘﺎﻳﺴﻪ ﮐﻨﻴﺪ‪.‬‬
‫ﮔﺬﺭﺩﻫﻲ = ﺗﻌﺪﺍﺩ ﺑﻴﺖ ﻫﺎﻳﻲ ﮐﻪ ﺩﺭ ﻳﮏ ﺛﺎﻧﻴﻪ ﺭﻣﺰ ﻣﻲ ﺷﻮﻧﺪ‪.‬‬
‫‪ .۳‬ﻫﺪﻑ ﺍﻳﻦ ﺗﻤﺮﻳﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻓﺮﮐﺎﻧﺲ ﺗﮑﺮﺍﺭ ﺣﺮﻭﻑ ﺩﺭ ﻣﺘﻮﻥ ﺍﻧﮕﻠﻴﺴﻲ ﺑﺮﺍي ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﺘﻮﻧﻲ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺭﻭﺵ ﻫﺎﻳﻲ ﺟﺎﻧﺸﻴﻨﻲ ﺗﮏ ﺍﻟﻔﺒﺎﻳﻲ‬
‫ﺭﻣﺰﮔﺬﺍﺭي ﺷﺪﻩ ﺍﻧﺪ‪.‬‬
‫ﺍﻟﻒ‪ .‬ﻳﮏ ﺑﺮﻧﺎﻣﻪ ﺑﻨﻮﻳﺴﻴﺪ ﮐﻪ ﻳﮏ ﻣﺘﻦ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ ﻭﺭﻭﺩي ﺩﺭﻳﺎﻓﺖ ﻣﻲ ﮐﻨﺪ ﻭ ﺩﺭﺻﺪ ﺗﮑﺮﺍﺭ ﺣﺮﻭﻑ ﺭﺍ ﺩﺭ ﺍﻳﻦ ﻣﺘﻦ ﻣﺤﺎﺳﺒﻪ ﻣﻲ ﮐﻨﺪ‪ ).‬ﻳﮏ ﻟﻴﺴﺖ ﺍﺯ‬
‫ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ ﺑﺎ ﺩﺭﺻﺪ ﺗﮑﺮﺍﺭ ﺑﻪ ﻋﻨﻮﺍﻥ ﺧﺮﻭﺟﻲ ﺑﺮ ﻣﻴﮕﺮﺩﺍﻧﺪ( ‪.‬‬
‫‪ ‬‬
‫‪ Avalanche Effect ‬‬
‫‪ Throughput ‬‬
‫‪2‬‬
‫‪3‬‬
‫ﺏ‪ .‬ﻳﮏ ﻣﺘﻦ ﺍﻧﮕﻠﻴﺴﻲ ﻧﺴﺒﺘﺎ ﺑﺰﺭﮒ ﺭﺍ ﺑﻪ ﻋﻨﻮﺍﻥ ﻭﺭﻭﺩي ﺑﻪ ﺑﺮﻧﺎﻣﻪ ﺑﺪﻫﻴﺪ ﻭ ﻟﻴﺴﺖ ﺣﺮﻭﻑ ﺍﻟﻔﺒﺎ ﺑﺎ ﺩﺭﺻﺪ ﺗﮑﺮﺍﺭ ﻫﺮﻳﮏ ﺭﺍ ﺑﺪﺳﺖ ﺁﻭﺭﻳﺪ‪ .‬ﺑﺮﺍي ﻧﻤﻮﻧﻪ‬
‫ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻧﻤﺎﻳﺸﻨﺎﻣﻪ ﻫﻤﻠﺖ ﮐﻪ ﺩﺭﻟﻴﻨﮏ ﺯﻳﺮ ﺁﻭﺭﺩﻩ ﺷﺪﻩ ﺍﺳﺖ ﺍﺳﺘﻔﺎﺩﻩ ﮐﻨﻴﺪ‪.‬‬
‫‪http://the‐tech.mit.edu/Shakespeare/hamlet/full.html ‬‬
‫ﺝ‪ .‬ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺟﺪﻭﻝ ﺑﻪ ﺩﺳﺖ ﺁﻣﺪﻩ ﺩﺭ ﻗﺴﻤﺖ ﺏ ﻣﺘﻦ ﺯﻳﺮ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻧﻤﺎﻳﻴﺪ‪.‬‬
‫‪ ‬‬
‫‪XTEIA DSL ASQA FKSF FKY IVYOPYUJQ NI PAY NI LNVRA TU SMYVTJSU ‬‬
‫‪UYLAESEYV YUCDTAK SUR FKYTV VSUG NVRYV SVY JDNAYDQ VYDSFYR‬‬
‫ﺩ‪ .‬ﺑﺎ ﻓﺮﺽ ﻗﺎﺑﻞ ﺗﺸﺨﻴﺺ ﺑﻮﺩﻥ ﻣﺘﻦ ﺁﺷﮑﺎﺭ‪ ،٤‬ﺑﺮﻧﺎﻣﻪ ﺍي ﺑﻨﻮﻳﺴﻴﺪ ﮐﻪ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﻗﺴﻤﺖ ﺍﻟﻒ ﻭ ﺏ ﺑﺘﻮﺍﻧﺪ ﻳﮏ ﻣﺘﻦ ﺭﻣﺰﻧﮕﺎﺭي ﺷﺪﻩ ﺑﺎ ﺭﻭﺵ ﻫﺎي‬
‫ﺟﺎﻧﺸﻴﻨﻲ ﺗﮏ ﺍﻟﻔﺒﺎﻳﻲ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﮐﻨﺪ‪ ) .‬ﺑﺮﺍي ﺳﺎﺩﮔﻲ ﻓﺮﺽ ﮐﻨﻴﺪ ﮐﻪ ﻣﺘﻦ ﺁﺷﮑﺎﺭ ﺩﺭ ﺍﺧﺘﻴﺎﺭ ﺷﻤﺎ ﻗﺮﺍﺭ ﺩﺍﺭﺩ(‬
‫ﻣﻮﻓﻖ ﺑﺎﺷﻴﺪ‪.‬‬
‫‪ ‬‬
‫‪ Plain Text ‬‬
‫‪4‬‬