Custom-Written, AI & Plagiarism-Free with Passing "Guaranteed"

1) Claude Shannon presented the encryption design principles of-1

INFA 640 Homework 2
Choose the best answer (one) and give reason in a few sentences for your choice or not choosing
others. Please give a reference. To get full credit the reason should be in your own words, not a
copy from any reference. Without reason in your own words you will not get full credit.

1)      Claude Shannon presented the encryption design principles of _________________.

a)      multiplication and factoring

b)      exponentiation and Logarithms

c)      confusion and diffusion

d)      perplexion and reflection

Reason: how and why those principles guide the encryption?

2)      A good hash function creates _________ mapping between the source string and the output string.

a)      complex

b)      as many as needed

c)      divisional

d)      one to one

Reason why is it considered good?

 

3)      To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.

a)      his/her public key

b)      the receiver’s public key

c)      his/her private key

d)      the receiver’s private key

Reason How is it used?

4)      A number is relatively prime to another if they _____________.

a)      have only each other as factors

b)      have no prime factors in common

c)      only have one prime factor in common

d)      are both divisible by 7

Reason:  

5)      Repudiation means

a)      Faking one’s identity

b)      Uproot

c)      Deny ownership

d)      Plant clues in the text

Reason: Why it is important?

6)      (25 pts) The following is a ciphertext:

 

ZQ GDH LMJ XHBIG JODHAC PD CLUJ XZUJF ZO KLMZV LV L GDHOA RLO, PCJO ECJMJUJM GDH AD QDM PCJ MJVP DQ GDHM XZQJ ZP VPLGV EZPC GDH, QDM KLMZV ZV L RDUJLNXJ QJLVP

JMOJVP CJRZOAELG

 

a)      What kind of cipher text is this? Mono- or Poly alphabetic; [Hint: assume one and when that does not work look for the other] [2 points]

b)      Describe your cryptanalysis process. List all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.

[If you find solution online or use online tools please give reference. However, you should describe the steps as if you are working without the tool, (Hint consider starting with the frequency analysis) to get full credit]

[If you list partial steps you will get partial credit]

[15points]

 

c)      State the plain text message in readable form i.e. separating words if required

[the solution worked without the help from online tools will be given full credit] [2 pts]

d)      List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features [ 6 pts]

Note: Only a decrypted message even if it is correct one without the methodology and the detailed description of the self-explanatory steps used to decrypt, would not get points.


100% Plagiarism Free & Custom Written,
tailored to your instructions
paypal checkout

Assignment Experts UK delivers 100% original, custom-written work. We don't use paraphrasing tools, AI content generators like ChatGPT, or any writing software. All content is self-written by our expert writers and guaranteed plagiarism-free.

Discover more


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guaranteed

STILL NOT CONVINCED?

Check out samples from our Academic Writing Service, created by our writers to showcase the high-quality work you can expect!

View Our Samples

We're Open