SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 18 Nov 2017 My Price 10.00

attacker has a copy of the cipher text and its content yields

look at the attachment, pls dont doubt if you dont know an dont copy the once they already have in course hero i dont know if they are correct follow the prompt requirement.

1)      If an attacker has a copy of the cipher text and its content yields no information at all with regard to the plain text message, the text is considered _____________.

a)      cipher perfect

b)      third-eye blind

c)      perfectly secure

d)      third-party secure

Reason:

2)      Which is not a weakness of a shift cipher? _________________________

a)      Once you have the code book you can decode the message.

b)      Natural language letter frequency makes them easy to decode.

c)      The number of letters in the alphabet makes them easy to decode.

d)      Once the shift is determined the message is decoded almost instantly.

Reason:

3)      Quantum cryptography is based on the physics of light. True/False,

Reason with details:

 

4)      Claude Shannon presented the encryption design principles of _________________.

a)      multiplication and factoring

b)      exponentiation and Logarithms

c)      confusion and diffusion

d)      perplexion and reflection

Reason with how and why it helps encryption:

5)      Two numbers are said to be congruent if _____________________.

a)      one is a multiple of the other

b)      they produce the same remainder after modulo division

c)      they have the same prime number as a factor

d)      they are quotients of the same number

Reason:

6)      A good hash function creates _________ mapping between the source string and the output string.

a)      complex

b)      as many as needed

c)      divisional

d)      one to one

 

Reason why it is good:

7)      A number is relatively prime to another if they _____________.

a)      have only each other as factors

b)      have no prime factors in common

c)      only have one prime factor in common

d)      are both divisible by 7

Reason :  

8)      (15 pts) The following is a ciphertext:

a)      U GIRJ CFJ SWAY. SWAY UR JQW GUCB-TUDDWY. SWAY UR JQW DUJJDW-BWAJQ JQAJ LYUCPR JFJAD FLDUJWYAJUFC. U NUDD SAKW GM SWAY. U NUDD EWYGUJ UJ JF EARR FOWY GW ACB JQYFIPQ GW. ACB NQWC UJ QAR PFCW EARJ U NUDD JIYC JQW UCCWY WMW JF RWW UJR EAJQ. NQWYW JQW SWAY QAR PFCW JQWYW NUDD LW CFJQUCP. FCDM U NUDD YWGAUC – SYACT QWYLWY

b)      What kind of cipher text is this? Mono- or Poly alphabetic; Hint: assume one and when that does not work look for the other

c)      Describe your cryptanalysis process. Show all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.  

d)      If you did find solution somehow please show steps as if you are trying to find the solution. So I know you have exercised your knowledge

e)      State the plain text message.

f)       List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features

Note: Only a decrypted message even if it is correct without the methodology and the detailed description of the self-explanatory steps used to decrypt, would not get points.

Attachments:

Answers

(5)
Status NEW Posted 18 Nov 2017 12:11 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)