SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 305 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 04 Jan 2018 My Price 10.00

understand the process involved with protecting

Looking for help completing this project. Would love to have it done by sunday mid day if at all possible thanks.

Cryptography Exercise

NAME:                              

DATE:

Understanding cryptography helps us to understand the process involved with protecting information as it is sent over the internet/network. This exercise will help you to understand the process of cryptography.Use this document to present your work and submit it with the naming format of Last_Name_Cryptography_Exercise.docx.

 

Encryption Project

Using the Simple Transposition Encryption Example provided, complete this portion of the exercise. (2 points each)

1.       Using the keyword LOCKED and the transposition method, encrypt the following messages and enter your answer below the message:

a.      Swing by the coffee shop

·         -

b.      Stay up all night long and study

·         -

 

2.      Now, using the keyword FORGET and the transposition method, decrypt the following messages and enter your answer below the message:

a.      Oeo dlhe yvt ieeo dasn utv

·         -

b.      Nhse iyun irir tosf huei koo

·         -

 

3.      Using Simple Transposition Encryption create one encrypted message and list itbelow with your own KEY(S).

 

a.      –                                                                                          

 

 

Use the section on the Substitution Cipher (also called Rotation (ROT) cypher) on page 423 of the Text book to complete this portion of the exercise.(2 points each)

1.      Using the ROT13 sequence method, encrypt the following messages and enter your answer below the message:

a.      Go to the second star to the right

·         -

b.      Or you will be lost in space

·         -

 

2.      Using the ROT13 sequence method, decrypt the following messages and enter your answer below the message.

a.      Arprffvgl vf gur zbgure bs vairagvba

·         -

b.      Gur pbhefr bs gehr ybir arire qvq eha fzbbgu

·         -

 

3.      Using the ROT13 sequence method(or one of your own choosing) create one encrypted message and list itbelow. If you are using a different ROT, identify it.

 

a.      –                                                                                          

Attachments:

Answers

(5)
Status NEW Posted 04 Jan 2018 07:01 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)