How many bits is the encrypted message

Assignment Help Computer Network Security
Reference no: EM13190772

1. ASCII code is a fixed-length coding scheme. Using the 7-bit ASCII code table [3] or any other references, find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit (MSB), for example your name is Xxxx Ssss, the first letter is X, its ASCII is 1011000, adding 1 to the left position of MSB yields to 11011000. These bits sequence is the message that you will encrypt using the Simplified DES algorithm.

2. Based on the understanding of Q3 of Bart B, use the 10 bits password (1100110010) to generate the keys (K1 and K2).

Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers.

3. Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

Your answer should be detailed, you should show each output of each step of the algorithm besides the final answer.

4. How many bits is the encrypted message?

Reference no: EM13190772

Questions Cloud

Multinational stage of corporate international development : The multinational stage of corporate international development transcends any single home country. The ownership, control, and top management tend to be dispersed among several nationalities.
Nucleophilic substitution will predominate over elinmation : What are the conditions where Nucleophilic Substitution will predominate over elinmation? ALSO What are the conditions of solvent, temperature
How many cups of salt should added to five cups of mixture : How many cups of salt should be added to five cups of mixture A so that the resulting mixture has equal amounts of salt and pepper?
Will efforts unambiguously help unions american workers : American unions often try to win public support for boycotting goods made in less-developed countries by workers who work very long hours at low pay in unhealthy conditions.  If successful, will these efforts unambiguously help the targeted foreign..
How many bits is the encrypted message : How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit
How many items would need to be stocked : In an inventory study it was determined that on average demands for a particular item at a warehouse were made four times per day. What is the probability that on a given day an item is requested.
State what are the complete and net ionic equations : What are the complete and net ionic equations for silver nitrate and potassium iodide in a double displacement
Acquiring and developing the project team : Examples of ____ include acquiring and developing the project team, performing quality assurance, distributing information, managing stakeholder expectations, and conducting procurements.
State coefficients in solubility-product expression : Include activity coefficients in your solubility-product expression. The Ksp of Hg2I2 is 4.6× 10-29.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd