Transposition technique to encrypt a message

Assignment Help Basic Computer Science
Reference no: EM13803526

Assignment

You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.

Use a 2-stage transposition technique to encrypt a message. The following information is what is needed to do this encryption: 

  • Key: 2314746
  • Message: The transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography (ignore the comma and the period in the message). 

In a 2-3-page paper, demonstrate this encryption and how you arrived at your answer.

In addition, answer the following questions:

  • Is it possible to decrypt the message with a different key? Justify your answer.
  • Do you agree with the statement of the message? Provide examples to support your view.  

Be sure to reference all sources using APA format.

 

 

Reference no: EM13803526

Questions Cloud

Describe industrial revolution propaganda : Describe industrial Revolution propaganda
What are some of the risks associated with each plan : Christensen & Assoc. is developing an asset financing plan. Christensen has $500,000 in current assets, of which 15% are permanent, and $700,000 in fixed assets. The current long-term rate is 11%, and the current short-term rate is 8.5%. Christensen'..
Role of music in our lives : Role of music in our lives
Write an essay about the best government in the world : Write an essay about The Best Government in the World. Using Nick Naylor's advice to Joey about writing essays using bullshit, write your own essay along the following lines.
Transposition technique to encrypt a message : You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.Use a 2-stage transpo..
Which class provides prebuilt dialog boxes : Which class provides prebuilt dialog boxes that enable programs to display windows containing messages (such windows are called message dialogs)
What are the most important criticisms of boards of director : The strategic management process is activated by Boards and their top management teams and they have a CSR responsibility strategy to create. They also need to be involved in social auditing and social performance reporting as these are critical aspe..
A security strategy involves risk assessment. : A key part of designing a security strategy involves risk assessment. Our tolerance to risk determines what provisions need to be in place to keep our risk at a manageable level. What is the process to determine an acceptable level of risk and how do..
Analyze the key approaches that negotiation team should use : Analyze the key approaches that your negotiation team should use in order to research both the government negotiators attending the negotiation session and the government's overall operations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the structure of the world wide web

Describe the structure of the World Wide Web as interconnected hypertext documents and create and validate HTML documents - create presentations using Cascading Style Sheets and DHTML.

  Marie program that will input a variable

To develop a MARIE program that will input a variable number of user entered Decimal whole number grades, validating each one (0-100) in a subroutine

  The role of the corporate privacy officer and information

Watch the You Decide scenario and using the information provided

  Use the supplied superclass car to create classes

Because Toyotas are superior to Fords or Chevys it should also implement the supplied Airplane interface. Give the methods something to do. I would suggest a println method since you can then see that the method actually ran.

  What would be the best choice of the degree

A B+ - tree index is to be built on the name attribute of the relation student. Assume that all the student names are o length 8bytes, disk blocks are of size 512 bytes , and index pointer are of size 4bytes. Given this scenariom, what would be th..

  Local telephone calls and long distance telephone calls

Will the distinction between local telephone calls and long distance telephone calls ever disappear? What may cause this to happen?

  What are two possible ways to achieve this goal

You need to relocate the existing user and computer objects in your company to different organizational units. What are two possible ways to achieve this goal? (Note: not the two "options" in the book.)

  Explain effects of compaction on normal processing

What about if you upgrade to memory that can be read or written to in 1nsec? Comment briefly on the effects of compaction on normal processing.

  Define multitasking and real-time terms of embedded system

Define, in your own words, "multitasking" and "real-time" in terms of embedded system

  State of six conditional flags after instructions executes

Forecast the state of six 8086 conditional flags after each of instructions which are given below executes. MOV AL,AH b. ADD BL,CL c. ADD CL,DH d. OR CX,BX

  How do you create a 4d array of int in c++

How do you create a 4D array of int in C++

  Explain hacktivism includes cracking for higher purpose

And "hacktivism" includes cracking for "higher purpose". Is it feasible to crack systems and still be ethical? Support the position.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd