Calculated hash value for the message

Assignment Help Basic Computer Science
Reference no: EM131561158

1: Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter's position in the alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26).

Bob uses this function to send a one-word message, GLARE, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value.

Give definition and properties of the hash function.

Show a message that Alice may have used to spoof Bob's message, and demonstrate that its hash value collides with Bob's original hash.

Q2: Consider the following plaintext message: THE SIXTEENTH PRESIDENT WAS ABRAHAM LINCOLN.

  1. If this message is sent unencrypted and successfully received, what is its entropy? And why?
  2. If this message is encrypted with DES using a random 56-bit key, what is the encrypted message's entropy? And why

Reference no: EM131561158

Questions Cloud

Determine the cost of goods sold expense : Determine the cost of goods sold expense assuming Kramer had used the LIFO method instead of the FIFO method
Discuss about the structural-functional perspective : What role has class, race, and gender played in their lives? How do you see these stratifiers as playing a role, even if the interviewee is unaware of it?
Order management system to an accounting system : How might a data warehouse solution facilitate information flow from an order management system to an accounting system?
How can companies control the value of their stock : What are some of the reasons why corporations invest in debt and stock securities? What are stock investments? Explain the accounting for stock investments
Calculated hash value for the message : Bob uses this function to send a one-word message, GLARE, to his banker Bill, along with his calculated hash value for the message.
What was the largest number of medical school applicants : Medical school applicants according to a study from the american medical association, the number of medical school applicants from academic year 1997-1998.
List the major internal controls that were absent : Koss Corporation: Where were the internal controls? List the major internal controls that were absent within Koss Corporation's internal control system
Enterprise architecture diagrams : Use the case study and enterprise architecture diagrams to identify five or more risks which require a financial investment.
What amount does cullumber record as the cost for the land : Cullumber has the land graded for $4100. They paid $25000 for paving of a parking lot. What amount does Cullumber record as the cost for the land

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd