How many keys are there in this compound cipher

Assignment Help Computer Network Security
Reference no: EM131248921

Affine ciphers:-

Let a be an integer between 1 and 26, and let x be the integer corresponding to one of the 26 letters of the alphabet. The corresponding linear cipher transforms the message x into the cipher text y by

For example, if a = 3 and the message is "d," the cipher text is y = 3 × 4 = 12. If the message is "k," the cipher text is y = 3 × 11 mod 26 = 33 mod 26 = 7. To be acceptable, the value of a must be invertible mod 26, such that the correspondence from x to y can be uniquely inverted. A case that does not have this property is a = 4, for then both x = 3 (for "c") and x = 16 (for "p") lead to y = 12. An a is invertible if it has no common factor, other than 1, with 26. Hence, 4 is not invertible since both 4 and 26 share the factor 2. (See section 13.5.)

(a) List the acceptable values of a.

(b) Decipher the following linear cipher text:

(c) An affine cipher is of the form y = ax+b mod 26, where both a and b are integers between 1 and 26, with a being one of the values in part (a). How many keys are there in affine ciphers?

(d) An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

Reference no: EM131248921

Questions Cloud

Find the inverse of the a matrix : Hill devised a cipher that extends both transposition and linear ciphers. - Find the inverse of the A matrix given above.
Obtain the panel iv estimator in the pe model : For example, for variable x, type by id: egen avex mean(x) followed by summarize x and then generate mdx = x - avex + r (mean). Verify that you get the same estimated coefficients as you would with xtivreg, f e.
What was the number of victims killed and wounded : What psychological symptoms are exhibited by direct attack victims? If one is available, include a diagnosis. What psychological symptoms are exhibited by indirect victims, such as family members, friends, and coworkers of the direct victims? What ..
Faculty-approved organization : Write a 1,050- to 1,400-word paper using the faculty-approved organization from Week 1 in which you:
How many keys are there in this compound cipher : An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?
How should federal law enforcement engage state : What federal and state agencies are required to deal with an MCI resulting from a terrorist attack? Why? How do you distinguish between federal and state authorities for both operational and management functions? Explain. How do you ensure a fusion o..
Define computer protection strategies of physical security : Outline the theoretical premises underlying crime prevention through environmental design (CPTED). Discuss the relationship between CTPED, communities, and community- and problem-oriented policing. Use two current events to assist you in evaluatin..
How many possible keys are embodied in the final cipher text : How many possible keys are embodied in the final cipher text? - how many possible keys are embodied in the resulting double-encrypted cipher text?
Example company for each of business models below : Please find one example company for each of the business models below, and one small paragraph to explain the features of the companies that makes you think they are using these business models. A total of one page is enough. Thank you.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Ethics associated with future global cyber security issues

Interconnectedness Cybersecurity Poses to Society and the Pursuit of Commerce - What three policy points should be included in a proposed model for a GLOBAL cybersecurity policy that will help mitigate the effects of cyber-warfare, cyber-crime, and..

  Forensic challenge in mobile network

As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..

  Analyze the emerging security threats presented

Analyze the emerging security threats presented within the "Security Threat Report 2014" report. Analyze the major threats to mobile devices, and suggest at least two methods to mitigate the concerns.

  Explain difference between metrics measures and measurements

Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?

  Describe your thesis regarding the future of cybersecurity

Describe your thesis regarding the future of cybersecurity. Analyze the future of cybersecurity, including any opportunities for cooperation between the government and the private sector in creating or building a national cybersecurity infrastruct..

  Instructions of research paper

The instructions of research paper is to write about steganography techniques and applications - types and techninques of steganography and then discuss in-depth how is is used, which technique is popular, include Figures of how the technique is us..

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  How is your firewall implementation

Imagine you have installed and configured firewalls in all of the right places within your organization's network. Like any other organization, you try to stay current by deploying the latest and greatest in firewall technology.

  What is the peak data rate out of the router in one second

What is the peak data rate out of the router in one second - what is the long term average data rate out of the router?

  Identify potential physical threats that require attention

Identify at least five potential physical threats that require attention. Determine the impact of at least five potential logical threats that require attention.

  What are the various types of malware

What is buffer overflow, and how is it used against a Web server?Why does polymorphism cause greater concern than traditional malware? How does is affect detection?

  Managing an information security governance program

Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd