Choose the best answer (one) and give reason in a few sentences for your choice or not choosing others. Please give a reference
INFA 640 Homework 2
Choose the best answer (one) and give reason in a few sentences for your choice or not choosing
others. Please give a reference. To get full credit the reason should be in your own words, not a
copy from any reference. Without reason in your own words you will not get full credit.
1) Claude Shannon presented the encryption design principles of _________________.
a) multiplication and factoring
b) exponentiation and Logarithms
c) confusion and diffusion
d) perplexion and reflection
Reason: how and why those principles guide the encryption?
2) A good hash function creates _________ mapping between the source string and the output string.
a) complex
b) as many as needed
c) divisional
d) one to one
Reason why is it considered good?
3) To create a digital signature, a sender needs the plain text, the asymmetrical encryption algorithm, and ___________.
a) his/her public key
b) the receiver’s public key
c) his/her private key
d) the receiver’s private key
Reason How is it used?
4) A number is relatively prime to another if they _____________.
a) have only each other as factors
b) have no prime factors in common
c) only have one prime factor in common
d) are both divisible by 7
Reason:
5) Repudiation means
a) Faking one’s identity
b) Uproot
c) Deny ownership
d) Plant clues in the text
Reason: Why it is important?
6) (25 pts) The following is a ciphertext:
ZQ GDH LMJ XHBIG JODHAC PD CLUJ XZUJF ZO KLMZV LV L GDHOA RLO, PCJO ECJMJUJM GDH AD QDM PCJ MJVP DQ GDHM XZQJ ZP VPLGV EZPC GDH, QDM KLMZV ZV L RDUJLNXJ QJLVP
JMOJVP CJRZOAELG
a) What kind of cipher text is this? Mono- or Poly alphabetic; [Hint: assume one and when that does not work look for the other] [2 points]
b) Describe your cryptanalysis process. List all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.
[If you find solution online or use online tools please give reference. However, you should describe the steps as if you are working without the tool, (Hint consider starting with the frequency analysis) to get full credit]
[If you list partial steps you will get partial credit]
[15points]
c) State the plain text message in readable form i.e. separating words if required
[the solution worked without the help from online tools will be given full credit] [2 pts]
d) List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features [ 6 pts]
Note: Only a decrypted message even if it is correct one without the methodology and the detailed description of the self-explanatory steps used to decrypt, would not get points.
100% Plagiarism Free & Custom Written,
tailored to your instructions