1 findnbspphi2007 phi2008 and phib where b is the integer

Assignment Help Computer Networking
Reference no: EM13379905

1. Find φ(2007), φ(2008), and φ(b), where b is the integer obtained from the last four digits of your student number.

2. Find the smallest nonnegative integers x such that

(a) 7x ≡ 8 (mod 5); (c) 5x ≡ 7 (mod 11).
(b) 9x ≡ 6 (mod 7);

3. Using the fact that 10 ≡ 1 (mod 9), resp. 10 ≡ -1 (mod 11), prove the following divisibility rules for integers in decimal notation:

(a) "Casting out nines", i.e., an integer is divisible by 9 if and only if the sum of its digits is divisible by 9.

(b) Less well-known, but just as easy: An integer is divisible by 11 if and only if the alternating sum of its digits is divisible by 11. (Example:

11 | 1353 because 3 - 5+ 3 - 1 = 0, which is divisible by 11.)

4. (a) Encipher the word cryptography with the a!ne cipher with m = 26 and key k =(5, 9).

(b) Find the decryption function and decipher the result of (a).

5. Fix a modulus m and use the a!ne cipher with key k1 =(a, b) to encrypt an element x; then encrypt the result with a key k2 =(c, d).

What is the resulting cipher? Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

6. Suppose we work modulo 29 instead of modulo 26 for a!ne ciphers. How many keys are possible? What if we work modulo 30?

7. (a) Determine the number of bit permutations of the set {0, 1}n, n 2 N.

(b) Determine the number of circular right shifts of {0, 1}n.

(c) Find a permutation of {0, 1}n that is not a bit permutation.

8. Let ∑ be an alphabet. Show that the set ∑* together with concatenation is a monoid. Is this monoid a group?

Reference no: EM13379905

Questions Cloud

Perform the tasks below by using the correct sql statements : perform the tasks below by using the correct sql statements. you must create the statements in oracle by using the
Modify oracle table data using the correct sql statements : modify oracle table data using the correct sql statements. you must create the statements in oracle by using the
Taskanswer the question below in an academically rigorous : taskanswer the question below in an academically rigorous manner using business report style with claims supported by
1read the lecture notes and select one 1 instance in the : 1.read the lecture notes and select one 1 instance in the history of hci that you view as a key development that have
1 findnbspphi2007 phi2008 and phib where b is the integer : 1. findnbspphi2007 phi2008 and phib where b is the integer obtained from the last four digits of your student number.2.
Sapient is an international company based in massachusetts : sapient is an international company based in massachusetts. it has developed a unique and innovative agile methodology
Digitalx has been operating a chain of retail stores : digitalx has been operating a chain of retail stores selling cds dvds and games for a number of years. recently they
Imagine that you work for a consulting firm that offers : imagine that you work for a consulting firm that offers information technology and database services. part of its core
Security primitivesaexplain the different roles between : security primitivesaexplain the different roles between hashing and message authentication codes mac. can a good hash

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd