Determine the most likely intended plain-text message symbol

Assignment Help Mathematics
Reference no: EM131068907

1. Caesar Substitution Cipher. Recall that a Caesar shift cipher identifies (A, B, ... , Z) with Z26 = (00, 01, . . , 25) and enciphers using a shift, x→ (x +k) mod 26 for some private key k. Knowing this, decipher

HSS PZ MHPY PU SVCL DHY HUK JYFWAVNYHWOF

2. RSA Cryptosystent. An RSA cryptosystem has public key (1050958331, 1019). It enciphers text in 3-character (9-digit) blocks, with each text character identified with its 3-digit ASCII code. For example, the 3-character plaintext string "Abz" is identified with the 9-digit string 065098122 of ciphertext, which is then enciphered using the RSA public key.

You intercept the message 652557294 075733184 encrypted with this public key. Can you decipher it?

3. Suppose C ⊆ Fq(n) is a linear code of length n over Fq. The automorphism group of the code C is

Aut(C) = {g ∈ GL(n, q) : gC = C}.

(a) Prove that Aut(C) is a group.

(b) Find the automorphism group of the repetition code {000, 111} of length 3 over F2.

4. Recall that the nonlinear S-boxes in AES make use of a natural bijection between the field F28 and the group algebra F2C8 which has no algebraic realization.

(a) Prove that F2C8 is not a field.

(b) How much can be said about the algebraic structure of F2C8 using the CRT for polynomials?

5. A cyclic linear code of length 6 over F5 has generator polynomial g(x) = x3 + 2x2 + 2x + 1. Text characters are encoded using the base 5 representation of their standard ASCII decimal number. For example B = 66 = 231 base 5 is identified with the message m(x) = 2x2 + 3x + 1, then encoded as g(x)m(x).

Suppose you receive the two character message

2x5 + 3x4 + x2 + 3,              2x4 + 2x3 + 3x2 + 4x + 4.

(a) Show that the first character in the received message is most likely error-free, and decode it.

(b) Show that the second character of the received message contains errors. Find the most likely error, decode it, and obtain the 2-character message.

6. One technique for creating regular LDPC codes is to use the incidence matrix of the Cayley graph of a group G with a relatively small generating set of involutions S. Vertices are the elements of the group, and there is an edge between x and y if x = ys for some s ∈ S.

(a) Recall that the dihedral group D10 is generated by two involutions a, b satisfying a2 = b2 = e and (ab)5 = e. Draw the Cayley graph associated with (D10, {a, b}). Find the 5 x 10 parity check matrix H for the LDPC code associated with this graph.

(b) In the LDPC code associated with the Cayley graph (D10, {a, b}), the message nodes are f1, ..., f5 where fi = (ab)i, i =1, ... , 5, and the check nodes are ci = fia,1, ... , 5. For a message to be valid, the value of each message node should be the sum modulo 2 of the values at the check nodes that are connected to it. In the LDPC decoding algorithm, the values of message nodes and check nodes are passed back and forth and adjusted to the most likely state at each stage. First the values of the L's are used to determine a list of likely values for each of their check nodes, then check nodes are adjusted to their most likely value, and then the new values of these ci's are used to adjust the values of the fi's.

If the received values are f1f2f3f4f5c1c2c3c4c5 = 0101100110, find the most likely actual message after one pass back and forth through the LDPC graph decoding algorithm. Use the parity check matrix to verify that this is a code-word.

7. Reed-Solomon Code. An RS-(7, 3, 5) code has length 7 and dimension 3 over F23 = F2(ζ), where ζ3 = ζ + 1. The code has designated distance 5, so the generating polynomial is g(x) = (x + ζ)(x + ζ2)(x + ζ3)(x + ζ4) ∈  F23 [X]. 8-bit hexadecimal ASCII symbols are first encoded as 9-bit strings by adding a check digit: For example: N = 4E in 8-digit ASCII becomes 010011100 as a 9-bit string, which is represented as the message polynomial m(x) = ζx2+ (ζ+1)x+ζ2.

It is desirable in transmission that the first part of the transmitted message contains the actual message. The first three blocks of the transmitted message is x4m(x), and the last four blocks are the remainder r(x) of x4m(x) divided by g(x).

Calculate the transmitted message c(x) = x4m(x) + r(x) that would be associated with the plaintext symbol ± = B1 in extended ASCII, and write this as a 21-bit binary string.

8. RS decoding. In the RS-(7, 3, 5) code of exercise 7, the 21-bit string 001010100111000001011 is received. Determine the most likely intended plain-text message symbol. How many bit errors occurred? How many symbol errors?

Reference no: EM131068907

Questions Cloud

Create and possess a people redeeming them : The Wall of Isolation - This wall described as one pushing others away intentionally to protect oneself from being hurt in some way (physically, emotionally, economically, etc.). Examining my life I see bits of this in my own experience, however, ..
Percentage change in spot rates : Collect quarterly inflation data for U.S. and UK for the last five years (2011 - 2015). Collect quarterly spot exchange rates of British Pound ($/£). Calculate the inflation differentials between U.S. and UK, and the percentage change in spot rates. ..
Assume that the returns from asset are normally distributed : Assume that the returns from an asset are normally distributed. The average annual return for this asset over a specific period was 17.2 percent and the standard deviation of those returns in this period was 43.92 percent. What is the approximate pro..
Influence of the daubert standard on the written report : Using your textbook and the Argosy University online library resources, discuss how you would write (in about 350 words) and present a risk assessment to the parole board, considering the following: The influence of the Daubert Standard on the writ..
Determine the most likely intended plain-text message symbol : RS decoding. In the RS-(7, 3, 5) code of exercise 7, the 21-bit string 001010100111000001011 is received. Determine the most likely intended plain-text message symbol. How many bit errors occurred? How many symbol errors
What is the difference between the positions of the traders : Trader A enters into a forward contract to buy an asset for $1000 in one year. Trader B buys a call option to buy the asset for $1000 in one year. The cost of the option is $100. What is the difference between the positions of the traders? Show the p..
Regional trading bloc : Starting with the first part of the previous century, Europe had a growing economy, a flexible social structure, and a good educational system, which assisted the gradual development of modern industrialization.
Classified as low-risk-average-risk and high-risk : Laura Drake wishes to estimate the value of an asset expected to provide cash inflows of $3,800 per year at the end of years 1 through 4 and $22,336 at the end of year 5. Determine what is the most Laura should pay for the asset if it is classified a..
Issued convertible bonds : Pacheco Inc. issued convertible bonds 10 years ago. Each bond had an initial term of 30 years, had a face value of $1,000, paid a coupon rate of 11%, and was convertible into 20 shares of Pacheco stock, which was selling for $30 per share at the time..

Reviews

Write a Review

Mathematics Questions & Answers

  Questions on ferris wheel

Prepare a Flexible Budget Gator Divers is a company that provides diving services such as underwater ship repairs to clients in the Tampa Bay area.

  Logistic map

This assignment has two question related to maths. Questions are related to bifurcation cascade and logistic map.

  Finding the probability of cards

This assignment has questions related to probabiltiy.

  Systems of ode

Find all the xed points, and study their stability and Draw the phase portrait of the system, as well as the graphs of the solutions in all relevant cases.

  Derive the boolean expression

Derive the Boolean Expression and construct the switching circuit for the truth table stated

  System of equations

Evaluate which equations are under-identified, just-identified, and over-identified.

  Linear programming problem

Linear programming problem consisting of only two constraints with one objective function.

  Find the natural domain

Find the natural domain of the given functions.

  Introduction to numerical methods

Compute the coecients of the polynomials using the term recurrence relation.

  Chart of the topological manifold

De?nition of smoothness of functions on a smooth manifold is chart independent and hence geometric.

  Mathematics in computing

Questions related on mathematics in computing.

  Complex problems

Complex problems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd