Binary and hexadecimal number systems

Assignment Help Basic Computer Science
Reference no: EM13933995

1. Let's get some practice with the binary and hexadecimal number systems

a. Convert the hex value A1B2C3 into binary
b. Convert the binary value 1100 0000 0001 1101 1100 1010 1011 0101 into hex.
c. Convert the binary value 1000 0100 0010 0001 0011 0110 1100 1111 into hex.
d. What is ABCFFE + 2 equal to (assuming hex values)?
e. What is 133AC + AC567 equal to (assuming hex values)?

2. Now let's get some practice converting text to its hex equivalent value.

a. What is the ASCII representation in hex for the word Crime?
b. What is the ASCII representation in hex for the word HACKER?
c. What is the ASCII representation in hex for the phrase Good Luck?
d. What is the text message represented by the following hex digits?
4F 6E 63 65 20 55 70 6F 6E 20 41 20 54 69 6D 65

3. Let's look at an old Roman age encryption scheme. Let's say we intercepted a message from a known Celtic hacker group. We know from experience that this group uses the characters from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase "Trudy Jones". For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message.

a. What is the message hidden in du yd JQD8FQXFTCDLK? Remember that you'll have to reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message.

b. The message is actually describing a fictional character. What would the encrypted name of this character be using the same encryption scheme as the original message?

4. Now let's look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 8 positions to the left.

a. I will email you the key which is encoded within a spam email message. Once you receive the email go to https://www.spammimic.com/ and click on Decode. Cut and paste the body of your email into the Decode window and get the key. The key will be 2 hex numerals. If you don't get that when you decode the message, you haven't copied the entire email
message. What is the key?

b. Using the key and the above algorithm, decrypt the following name (given in hex): 22 E2 93 43. Remember that you'll have to reverse the order and direction of operations in order to decrypt the name (i.e. Start by rotating 8 positions right)

c. The answer to part b is the name of a Norse god. Find the name of his father and, using the key and the above algorithm, encrypt the name (in upper case) and put in hex format.

5. One failing of an encryption system occurs if we never let the encrypted value of a letter be the same as the original, especially if a letter always encodes to the same value. Let's see how we can exploit these weaknesses. Let's assume that we know that the name MITNICK is in an intercepted message. If we received the following transmission, what are the encrypted values of the letters M, I, T, N, C, K?

HTGGMGXKPOKVPKEM

Reference no: EM13933995

Questions Cloud

The legal effect of directives : If the provisions of a directive were held in appropriate circumstances to be directly enforceable against individuals?..." Craig, „The Legal Effect of Directives: Policy, Rules and Exceptions? (2009) 34 E.L.Rev. 349, 376
Does oklahoma recognize medical marijuana : 1. Does Oklahoma recognize medical marijuana? Does California's prescription law carry over to Oklahoma?
Appropriate review tribunal addressing : Prepare a submission to the appropriate review Tribunal addressing its jurisdiction to review the decision and seeking that the original decision be set aside, including reference to all necessary and relevant supporting documents.
Understand the role of the major eu institutions : Understand the role of the major EU institutions. Task 3a The Communities Act 1972, which gives legitimacy to the UK's membership of the EU is under threat. Mr Cameron, the UK Prime Minister, has promised a referendum by 2017 to allow the British ..
Binary and hexadecimal number systems : 1. Let's get some practice with the binary and hexadecimal number systems a. Convert the hex value A1B2C3 into binary
What is meditation : What is meditation? Please include a basic definition, types and techniques in the discussion. In what ways could the quality of your life change for the better if/when a person meditates regularly? Explain and please provide references.
The values of the shear force and bending moment : The horizontal steel shaft with two diameters is welded to the fixed block at A. Construct the dia-grams of shear and moment in the shaft due to its weight. Determine the values of the shear force and bending moment at the discontinuity in diamete..
Size of the company and expand its business : James wants to raise more capital to increase the size of the company and expand its business. What options does James have in seeking to raise more funds?
Concept of agreement in contract law : Advise Aaron as to his legal position with reference to the concept of agreement in contract law, you will need to ascertain whether in relation to each party there has been a firm offer and a corresponding acceptance.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Designs across slides in a presentation is important

Using the same formatting and designs across slides in a presentation is important to develop what vital quality

  Explain the conceptual model employed in the design

Explain the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

  Investigate and discuss how data is structured

Choose any two of the problem areas and discuss in detail how the database approach solves the problem when compared to alternative approaches.

  How to convert a string of binary into decimal

how to convert a string of binary into decimal and a decimal into binary using java

  Write an update statement to change the phone number

Write an UPDATE statement to change the phone number of employee with EmployeeNumber 11 to 360-287-8810. Run this SQL statement.

  What is the capacity for user data in mode one

What is the exact data capacity (in bytes) of a mode-2 CD-ROM containing the now-standard 80-min media? What is the capacity for user data in mode 1?

  Mariko current dietary pattern

Mariko, age 2, prefers a daily diet of rice or noodles that have been drenched in soy sauce. She will take a few bites of tofu when her mother insists, but refuses meats, fish, and most vegetable. What nutrients is she missing? What health concern..

  Describe potential challenge for collaboration-it department

Author recommends ways to do this. Describe potential challenge that this type of collaboration might face and explain way of dealing with it.

  Redesigning security operations

Redesigning Security Operations

  Better software tool internet explorer or mozilla firefox

There are several Internet browsers available today, and many people select which to use without giving it consideration. Explain which is better software tool: Internet Explorer, Mozilla Firefox, or Google Chrome?

  Develop a new application system for your business partner

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Describes the benefits of getting a college education

Change the Font style and Font size of the numbers in the Worksheet and change the Row and Column headins to Bold Font.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd