What is the unicity point of the cipher

Assignment Help Computer Network Security
Reference no: EM131248940

Homophonic cipher:-

Suppose that a language using an alphabet of J letters has the property that the i-th letter has a frequency of ki/N, for each i, where the ki's and N are integers with

A homophonic cipher is made up of exactly N symbols, with ki of these assigned to the i-th letter of the alphabet (and with no duplications). When a letter i is to be encrypted, one of the ki cipher symbols assigned to it is chosen at random. This will make all N code symbols appear with probability 1/N. To determine the unicity point of such a code, it is necessary to modify the basic relation for H(K|C) because H(C|M,K) is not zero.

(a) Show that in general

(b) Show that for the situation of this exercise

(c) If the language has an entropy determined only by the frequency of its letters, can the homophonic cipher be broken?

(d) The number of ways of assigning symbols for this cipher is

If the entropy of the language is H per letter, what is the unicity point of the cipher?

(e) Assuming that the entropy of English is 1.5 bits/letter and that the homophonic code of 100 symbols in the text is used, what is the unicity point? (Note that log W = 377.)

Reference no: EM131248940

Questions Cloud

Compare the forecast values with the actual values : In Section 13.9 you were introduced to the Schwarz criterion to determine lag length. How would you use this criterion to determine the appropriate lag length in a VAR model? Using the data on PCE and PDI given in Table 21.1, develop a bivariate V..
Define terms subject matter and personal jurisdiction : Explain the 3 different types of personal jurisdiction, which you have learned from your reading, research, and lectures. The three types of personal jurisdiction are personam jurisdiction, in rem jurisdiction, and quasi in rem jurisdiction. Provi..
Describe your process and the items you uncovered : Describe your process and the items you uncovered during your review. In a few sentences, explain how you will correct the issues and ask questions if you need help or advice
Business forms under consideration best : Advise Shania on which of the business forms under consideration best accomplishes her business goals. Thoroughly explain the reasons for your recommendation.
What is the unicity point of the cipher : Assuming that the entropy of English is 1.5 bits/letter and that the homophonic code of 100 symbols in the text is used, what is the unicity point?
Create written work utilizing concepts of critical thinking : Identify the informal fallacies, assumptions, and biases involved in manipulative appeals and abuses of language. Create written work utilizing the concepts of critical thinking.
Write about the theme of death by making connections : Write two to three paragraphs essay: About the theme ( Death) - write about the theme of Death by making connections between these two readings, and how was death in those two readings. in 2-3 simple small paragraphs.
Case for violence in an effective and persuasive way : In an essay of 300 words or more, explain whether you think Jones has made the case for violence in an effective and persuasive way. If so, what is it about his article that makes it effective and persuasive? If it is not, where do the problems li..
Is there a unit root in this time series : On the basis of these results, is the housing starts time series stationary or no stationary? Alternatively, is there a unit root in this time series? How do you know?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  Describe the sarbanes-oxley act

Describe the Sarbanes-Oxley (SOX) act and Committee of Sponsoring Organizations (COSO) framework - describe the process of performing effective information technology audits and general controls.

  What are the most significant security concerns

What are the most significant security concerns related to email security? First, evaluate the risks and potential consequences associated with an email security breach.

  Construct the routing tables at each of the nodes

Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

  Why the topic is important to safeguarding the us

The research paper must include a SUMMARY of the topic, the IMPACT and RELEVANCE the topic has towards Homeland Security, and the student's DEFENSE as to why the topic is important to safeguarding the United States.

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Process of generating an rsa key pair

List the smallest 10 numbers that are greater than 1000 and are candidates for being selected as the public key - can the number 1995 be selected as the public key? Justify your answer.

  Describes how malicious code can get on your company

Which statement best describes the advantages of public key encryption?

  Identify three human and technological protective measures

Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.

  Describe the three principles of ip security

Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd