Write a report explaining the encryption algorithm

Assignment Help Computer Network Security
Reference no: EM133631325

Cryptography Homework

  • Find good encryption solutions
  • Search the web for various commercial encryption algorithms.
  • Find one that you feel may be "snake oil".
  • Write a report explaining the encryption algorithm and your opinion

*in-text citations and references are required
*written in at least 2~3 paragraphs

Compete encoding and decoding messages

Julius Caesar used a simple substitution cipher to send messages to his troops. He substituted each letter by the letter that was 3 places further along in the alphabet, so that "a" was replaced with "D", "b" with "E" and so on.

  • Complete the table below to show what each letter is enciphered as using this system.

a    b        c    d    e    f    g    h    i    j    k    l    m    n    o    p    q    r    s    t    u    v    w    x    y    z       
D    E        F                                                                                                

Using the Caesar Cipher, encode the name of your school. Did your partner get the same answer?Computer scientist would call 3 the "key" for this cipher. How many different keys are possible?Encode the following messages:

Caesar cipher with a shift key of 21

Plaintext: WELCOMECiphertext:

Simple Transposition Cipher with keyword: cat Write LIONS across the top and then write the plaintext, start with column 2 since I is the first letter, next read column 1, etc. the ciphertext is the resulting rows.

Plaintext: OCEAN CITY
Ciphertext:

Caesar cipher with a shift key of 7
Plaintext: MARYLAND BLUE CRABS
Ciphertext:

Caesar cipher with a shift key of 2
Plaintext: INNER HARBOR IN BALTIMORE CITY
Ciphertext:

Decode the following messages:
Use the Caesar cipher with a shift key of __2___
Ciphertext: EQORWVGTUEKGPEG
Plaintext:
Use the Caesar cipher with a shift key of __2___
Ciphertext: OCTANCPFJCUVJGDGUVETCDECMGU
Plaintext:

Use the Caesar cipher with a shift key of __-3___
Ciphertext: QEBZFMEBOEXPYBBKYOLHBK
Plaintext:

Use Simple Transposition cipher with the keyword: lions Write the second set of data down the first column, since I is the first letter, The second column will be the first five characters, etc.
Ciphertext: HPSSR TIIAB SETTA IHNYE CREOK
Plaintext:

Reference no: EM133631325

Questions Cloud

What are the remedies for racial discrimination : What are the five remedies for racial discrimination in capital sentencing? Which do you believe is the most inappropriate remedy? Why? Which do you believe
What interpersonal skills does social worker need to engage : Consider biological, psychological, and social factors. What interpersonal skills does the social worker need to engage with clients of this age group?
How you could apply selection to your healthcare setting : explain how you could apply their selection to your healthcare setting, include example of how the partnership could be integrated in your healthcare setting.
Discuss the financial sustainability of healthcare ecosystem : The ECOS Health System's project managers will attend a roundtable event to discuss the financial sustainability of healthcare ecosystems.
Write a report explaining the encryption algorithm : Write a report explaining the encryption algorithm and your opinion and Search the web for various commercial encryption algorithms
How comfortable or uncomfortable would you be : Then, imagine it was an older client (age 75 or above) in the same situation. How comfortable or uncomfortable would you be?
How does theory deepen your understanding of rays experience : How does the theory deepen your understanding of Ray's experience? How might this application of theory assist you as a social worker engaging with Ray?
How would you go about launching the campaign : Provide a plan for implementing your campaign. How would you go about launching the campaign.
What is the experimental group from the investigation : BIO 110- Which is control group from this investigation? What is the experimental group from this investigation? What is dependent variable from investigation?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze the industry researched for each security model

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings

  What did chinese government hope to accomplish

What did the Chinese government hope to accomplish through the Office of Personnel Management?

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  What should be minimum key size increase to meet objective

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Udp and tcp use 1s complement for their checksums

Suppose you have the following 2 bytes: 01011100 and 01010110. What is the 1s complement of the sum of these 2 bytes?

  Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

  Compare and contrast different approaches to system analysis

MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  Discussion on Networked Applications targeted by Botnet

MN502 Overview of Network Security Assignment, MIT Australia. Discussion on Networked Applications targeted by Botnet

  INFA 620 Network and Internet Security Assignment

INFA 620 Network and Internet Security Assignment Help and Solution - University of Maryland Global Campus Homework Help- Configuring a Firewall a front-end

  What is the plaintext m

In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5,n = 35. What is the plaintext M?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd