Cryptographic basis of the enigma machine

Assignment Help Accounting Basics
Reference no: EM13916985

1. A 2,000-bit message is used to generate a 256-bit hash. One the average, how many other messages could be expected to generate the same hash value? What does this tell us about the length of a hash as compared to the length of the message?

2. Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,... , pn} and corresponding ciphertext = {c1, c2,... , cn}. Suppose the encryption function is ci = pi + 5 (mod 26). If you receive the ciphertext message RNQJDHDWZX, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this? What are some weaknesses of this cipher?

3. Substantiate or refute the following statement: The cryptographic basis of the Enigma machine is the use of a trapdoor function.

4. Consider the following plaintext message: THE BOILING POINT OF WATER IS 212 DEGREES FAHRENHEIT.
a. If this message is sent unencrypted and successfully received, what is its entropy?
b. If this message is encrypted with DES using a random 56-bit key, what is the encrypted message's entropy?
c. If this message is encrypted with 3DES (using an optimal set of keys) what is the encrypted message's entropy?

5. A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital R, is XORed with the pseudorandom byte 10010101.
a. What is the ciphertext (in binary form) generated by the encryption of the character R? (Please show your work.)
b. How is the plaintext for this encrypted R recovered? (Please show your work.)

6. The following ciphertext is a monoalphabetic ciper:

ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ
Decrypt this message, and briefly describe your cryptanalysis methodology. In particular, list features of the ciphertext that hindered or helped your decryption process.

7. An organization has 2000 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. How many unique keys are required if:
a. The organization uses a symmetric cipher.
b. The organization uses an asymmetric cipher.

8. The following questions are worth 2 points each:
a. Bob picked N=77 for use in a RSA-encrypted message. Since N is part of the public key, Alice was able to crack Bob's message by determining the values of p and q that Bob used. What are the values of p and q did she determined?
b. Is 89,201,768 a prime number? Why or why not?

9. Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the cryptographic consultant for the project, do you think this is a good choice or not? You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice.

10. Modular arithmetic is used in public key ciphers. What is the value of X for each of the following:

a. X = 1,233 mod 16
b. X = 6 mod 50
c. X = 60 mod 5
d. X = 50 mod 6

11. Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

12. Using RSA, let p = 19, q = 13 and e = 5. Which of these is the complete private key:
a. (169, 247)
b. (173, 247)
c. (169, 216)
d. (173, 216)
e. None of the above.
(For full credit, please show your reasoning.)

13. Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key. The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach. The average time to crack the message is found to be 12 hrs. How many more bits would they need to add to the key to increase the average cracking time to 3072 hrs?

14. Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable idea? Why, or why not.

15. You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 29. You have secretly picked the value SA = 23.You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 17. What is the value of your shared secret key?

16. Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 128 bit hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

17. Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption. Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice. You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message.

18. Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter's position in the alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 ...x VChar N) mod(26). Bob uses this function to send a one-word message, PLANE, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

19. Do symmetric and asymmetric ciphers protect the integrity of the messages that they encrypt? If not, how could that service be provided?

20. Bob receives an important signed message that was sent by Alice using a public key encryption system. Are there any circumstances or events that would allow Alice to successfully repudiate that she had sent the message?

Part 2: Essay Question. Maximum length: three (3) pages (double spaced). Use APA format for in-line citations and references. (20 pts)

Compare and contrast symmetric and asymmetric encryption algorithms. Your response should include a brief overview of the cryptographic basis for each type of algorithm, and a comparison of their relative strengths and vulnerabilities. Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

Reference no: EM13916985

Questions Cloud

Non-recursive function vowels : Write a recursive function rvowels() that accepts a character string and counts and returns the number of vowels (aeiou) in the string. This solution should not include any loops. A global variable for the counter is acceptable. (Hint: one possibl..
A jogger is running at 9 kmph alongside a railway track : A jogger is running at 9 kmph alongside a railway track in 240 meters ahead of the engine of a 120 meters long train . The train is running at 45 kmph in the same direction. how much time does it take for the train to pass the jogger?
What is the probability that the battery will fail : Tests on a certain battery have determined that the mean (average) time until failure is 40 hours. Assume that the time T until failure of the battery is exponentially distributed. What is the probability that the battery will fail within 40 hours
What time will it take to pass a platform of 140 m long : A train 360 m long runs with a speed of 45 km/hr. What time will it take to pass a platform of 140 m long?
Cryptographic basis of the enigma machine : A 2,000-bit message is used to generate a 256-bit hash. One the average, how many other messages could be expected to generate the same hash value? What does this tell us about the length of a hash as compared to the length of the message?
How many 3-letter words with or without meaning : How many 3-letter words with or without meaning, can be formed out of the letters of the word, 'LOGARITHMS', if repetition of letters is not allowed?
What is the probability that a randomly chosen student : It is estimated that the number of text messages sent daily by a high school student is normally distributed with a mean of 200 and a population standard deviation of 50. What is the probability that a randomly chosen student sent less than 210 te..
Prepare a combined cash budget for the four months : Prepare a combined cash budget for the four months ending December 31, for two alternatives: weaving the place mats in cotton using the existing loom and weaving the place mats in linen using the new loom.
Influence of health policies-the future of health care : Based on the changing environment, as well as demographics in 21st Century America, there are many burgeoning issues and hurdles the U.S. Health Care System faces. As part of the preparation for your assignment, view the video titled "Health Care ..

Reviews

Write a Review

Accounting Basics Questions & Answers

  Common set of global accounting standards

With the move toward a common set of global accounting standards, the International Accounting Standards Board (IASB) has created the International Financial Reporting Standards (IFRS) to meet this goal.

  What criteria are used to judge the fairness

CPAs attest to management assertions by reference to pre-established criteria. What criteria are used to judge the fairness of financial statements during a financial statement audit? Why is it important that the attest function references specifi..

  Corporation paid dividends to bjorn

Bjorn owns a 40% interest in an S corporation that earned $150,000 in 2008. He also owns 30% of the stock in a C corporation that earned $150,000 during the year. The S corporation distributed $35,000 to Bjorn and the C corporation paid dividends ..

  Compute the target cost of a cd player

Required:  Compute the target cost of a CD player. Loyola International, Inc. is considering adding a portable CD player to its product line. Management believes that in order to be competitive,

  Management is considering purchasing an asset for 31000

management is considering purchasing an asset for 31000 that would have a useful life of 4 years and no salvage value.

  Journal entry for sale

Orbit Airways purchased a baggage-handling truck for $41,000. Suppose Orbit sold the truck on December 31, 2008, for $28,000 cash, after using the truck for two full years and accumulating a depreciation of $16,000.

  On december 1 stone mountain production company had a work

on december 1 stone mountain production company had a work in process inventory of 1200 units that were complete as to

  When this is done the warranty expense is recorded in

companies usually prepare an adjusting journal entry to accrue warranty expenses. when this is done the warranty

  Unadjusted trial balance columns

A company shows a $600 balance in Prepaid Insurance in the Unadjusted Trial Balance columns of the work sheet. The Adjustments columns show expired insurance of $200. This adjusting entry results in:

  Compute the percentage to the nearest tenth of a percent

Given the following balance sheet, complete a horizontal analysis. Compute the percentage to the nearest tenth of a percent.

  Comparing full absorption and variable costing

Comparing Full Absorption and Variable Costing

  On january 1 neuer company issued 585000 14 10-year bonds

on january 1 neuer company issued 585000 14 10-year bonds at par. interest is payable semiannually on july 1 and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd