We're Open

Custom-Written, AI & Plagiarism-Free with Passing "Guaranteed"

1) Claude Shannon presented the encryption design principles of-1

INFA 640 Homework 2
Choose the best answer (one) and give reason in a few sentences for your choice or not choosing
others. Please give a reference. To get full credit the reason should be in your own words, not a
copy from any reference. Without reason in your own words you will not get full credit.

1)      Claude Shannon presented the encryption design principles of _________________.

a)      multiplication and factoring

b)      exponentiation and Logarithms

c)      confusion and diffusion

d)      perplexion and reflection

Reason: how and why those principles guide the encryption?

2)      A good hash function creates _________ mapping between the source string and the output string.

a)      complex

b)      as many as needed

c)      divisional

d)      one to one

Reason why is it considered good?

 

3)      To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.

a)      his/her public key

b)      the receiver’s public key

c)      his/her private key

d)      the receiver’s private key

Reason How is it used?

4)      A number is relatively prime to another if they _____________.

a)      have only each other as factors

b)      have no prime factors in common

c)      only have one prime factor in common

d)      are both divisible by 7

Reason:  

5)      Repudiation means

a)      Faking one’s identity

b)      Uproot

c)      Deny ownership

d)      Plant clues in the text

Reason: Why it is important?

6)      (25 pts) The following is a ciphertext:

 

ZQ GDH LMJ XHBIG JODHAC PD CLUJ XZUJF ZO KLMZV LV L GDHOA RLO, PCJO ECJMJUJM GDH AD QDM PCJ MJVP DQ GDHM XZQJ ZP VPLGV EZPC GDH, QDM KLMZV ZV L RDUJLNXJ QJLVP

JMOJVP CJRZOAELG

 

a)      What kind of cipher text is this? Mono- or Poly alphabetic; [Hint: assume one and when that does not work look for the other] [2 points]

b)      Describe your cryptanalysis process. List all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.

[If you find solution online or use online tools please give reference. However, you should describe the steps as if you are working without the tool, (Hint consider starting with the frequency analysis) to get full credit]

[If you list partial steps you will get partial credit]

[15points]

 

c)      State the plain text message in readable form i.e. separating words if required

[the solution worked without the help from online tools will be given full credit] [2 pts]

d)      List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features [ 6 pts]

Note: Only a decrypted message even if it is correct one without the methodology and the detailed description of the self-explanatory steps used to decrypt, would not get points.


100% Plagiarism Free & Custom Written,
tailored to your instructions
paypal checkout

The services provided by Assignment Experts UK are 100% original and custom written. We never use any paraphrasing tool, any software to generate content for e.g. Chat GPT and all other content writing tools. We ensure that the work produced by our writers is self-written and 100% plagiarism-free.

Discover more


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples