Describe your argument in a brief and precise way

Assignment Help Computer Network Security
Reference no: EM131227759

Instructions

Please type your answers or hand write nicely.

Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below.

Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists of all 1-symbol words, so it is M ={0,1,2,3,4}. The encryption is done using the shift cipher, so it is given by the equation X = x+k (mod 5) applied to each letter of the plaintext (as discussed in class, x is the letter that we encrypt, k is the secret key, and X is the encrypted letter).

a. Suppose Eve knows that the symbols 0 and 1 have the same probability Prob(M=0)=Prob(M=1) = a, and the symbols 2,3, and 4 have the same probability Prob(M=2) = Prob(M=3) = Prob(M=4) = b, and she also knows that 0 is 2 times more likely than 2, so she knows that a = 2b. Find a and b. (Hint: use the fact that the sum of all probabilities is 1).

b. Calculate Prob (M= 2 | C = 4) (according to Eve's distribution). Recall that C= EK(M), that is the ciphertext is obtained by encrypting the message M (which is drawn according to Eve's distribution which you found at point a.), and the key is equally likely to be any number in the set {0,1,2,3,4}. You'll have to use the formula for conditional probability (see the notes, and the proof of Shannon's theorem).

c. (extra credit) Show that the given encryption system is perfectly secure for M, by checking the definition given in class for perfect security - version 1 (Note: As we did in the proof of the perfect security for one-time pad, you need to consider an arbitrary distribution on M, because the definition must hold for all possible distributions).

Problem 2. The alphabet is the same as in Problem 1, but now the space of messages consists of all 2-symbol words, so it is M1 ={(0,0),(0,1), ...(4,3),(4,4)}. Eve knows that the individual symbols 0, 1,2,3,4 have the same probabilities as in Problem 1, and that the two symbols in a word are independent. The encryption is again the shift cipher (recall that this means that the 2-symbol word
(x1, x2) is encrypted as the 2-symbol word (x1+k, x2+k), where k is the key and addition is modulo 5.)

a. Calculate Prob(M=(1,4)). (Hint: This is very simple, just use that the two symbols are independent).

b. Calculate Prob(M=(1, 4) | C = (2, 0)). (Hint: You'll use of course the formula for conditional probability. For the numerator, take into account that the key has to be 1. For the denominator, you need to look at all combinations (message, key) that can produce the ciphertext (2,0). Again use as a model, the proof of Shannon's theorem given in the notes, but adapt to this situation).

c. Using the formal definition of perfect security, explain what the results from (a) and (b) say about whether the shift cipher is perfectly secure for this M1.

Reference no: EM131227759

Questions Cloud

What is an advanced persistent threat : What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Be sure to cite sources.
Sql statements for creating relations : Show the SQL statements for creating relations corresponding to the entity sets and relationship sets in your design. Identify any constraints in the ER diagram that you are unable to capture in the SQL statements and briefly explain why you could..
How would you describe the correlation : MM207 Final Project Assignment. Create and paste in a scatterplot that compares Final Exam Score and Project Score. What is the correlation (r-value)? How would you describe the correlation (positive, negative, strong, weak, medium, none)? Include..
Discuss the principles of operant conditioning : Identify and discuss the reinforcement system at work that is supporting the undesired target behavior. Define operant conditioning and discuss how this method works to increase desired behavior.
Describe your argument in a brief and precise way : Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below.
Car average between the two fillings : A motorist wants to determine her gas mileage. At 23,352 miles (on the odometer), the tank is filled. At 23,695 miles the tank is filled again with 14 gallons. How many miles per gallon did the car average between the two fillings?
How can it alter an individual work : 1. How can IT alter an individual's work? How can a manager ensure that the impact is positive rather than negative?
Essay on my favorite subject mathematics : Write 300 words Essay on "My favorite subject Mathematics"
Individual score in a text file : Store ten student names and their individual score in a text file such as Notepad. There will be one score per student. Write a C# program using Microsoft® Visual Studio® to retrieve the names and the scores.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define encryption

In a given encryption system where the messages are expressed only as numbers and "e" is an integer.

  Compile a full draft of the final enterprise security plan

Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.

  Outline security threats and vulnerabilities

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The topc and title is security threats and vulnerabilities

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  How can one remove a rootkit from a computer

Explain in your words what a rootkits is, what harm it does, and why it is so difficult to remove and how can one remove a rootkit from a computer?

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Network forensic data collection

Explain how the Silk Road case serves as an example of how to carry out network forensic data collection. Conduct research to find out how the FBI collected evidence and traced the owner of the Silk Road. Suggest alternate steps that you might hav..

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  Describe the mandatory policies and processes

Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence

  Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have info about the topic . could you please help me with that ?

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  Explain the following in terms of ict - worms and malware

In about 300 words, explain the following in terms of ICT - Worms and Malware

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd