Computing minimal length of key-average cracking time given

Assignment Help Data Structure & Algorithms
Reference no: EM1345827

Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher which uses a 56-bit key. The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach. The average time to crack the message is found to be 2 hrs. As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 56 to 64 bits. They then conduct another challenge. What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase average cracking time to at least 100 years, determine the minimal length of the key?

Reference no: EM1345827

Questions Cloud

Explain how have audiences been impacted by new technology : Show how the proliferation of social media has changed leader communications and explain how have audiences been impacted by this new technology?
Statements of cash flows : Pick three companies from different industries and situate their statements of cash flows for the most recent year.
Computing entropy of plaintext message : Compute the entropy of the plaintext message?
Explain ranking differences and similarities : Maximizing shareholder returns usually implies that the firm must also satisfy customers, creditors, employees, suppliers, and other stakeholders.
Computing minimal length of key-average cracking time given : If Encrypt-It-Rite would like to increase average cracking time to at least 100 years, determine the minimal length of the key?
Describe the coefficient of determination : Describe the coefficient of determination. Suppose if you were given that the independent variable was 5, what would the predicted value be.
Explain the events that occur as water molecules : A speed skater moving across frictionless ice at 8.4 m/ s hits a 5.2 m -wide patch of rough ice. She slows steadily, after that continues on at 6.3 m/s.
Financing return on investment : My uncle is working in a corporation managing investment center. I approached him with sales of a large piece of equipment that can help firm save money in the end.
Protecting against foreign exchange risk : Illustrate out the foreign exchange risk? What specific problems does foreign exchange present in an organization? How could an organization needing Euros in six months protect itself from currency fluctuations?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Algorithm to produce a list of customers

Draw an algorithm to produce a list of customers from the Glad Rags Clothing Company's customer master file.

  Computing hash value for message

For a message, he computes the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26).

  Computing time complexity of procedure

What is the time complexity of the procedure? If A[l .. r] = [24, 30, 09, 46, 15, 19, 29, 86,78], what is the output?

  Explain types of information systems

Question 1. Explain five types of information systems, and give an example of each. Question 2. Describe three common reasons for a systems request. Try and find one not listed in the text.

  Computing total number of keys needed in symmetric cipher

Determine the total number of keys that are needed for organization if symmetric cipher is used.

  Write down the algorithm to insert an item

Write down the sample code to create a Linked List and allocate storage space for a node Write down the algorithm to insert an item At the beginning of a linked list

  Demonstrate a decision tree or table

Demonstrate a decision tree or table

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  Write a c++ program to find the intersection

Write a C++ program to find the intersection, A set is a collection of distinct entities regarded as a unit, being either individually specified or (more usually) satisfying specified conditions.

  Discuss new security features in windows server

Which of the system changeover methods is the most expensive? Why? Which of the system changeover methods is the most risky? Why?

  Js code to prompt the user for integer and print result

Write JS code which prompt the user for an integer and prints the result.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd