Determining entropy of ciphertext message

Assignment Help Computer Networking
Reference no: EM1353128

1) A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable. A crypto device encrypts each message into 20 bits of ciphertext.

a. What is the entropy of the plaintext message?
b. What is the entropy of the ciphertext message?
c. Is this a good cryptosystem? Why or why not?

Reference no: EM1353128

Questions Cloud

Estimate the necessary length of wire : Two identical point charges are fixed distance from one another. If one of their charges was doubled an the other was halved, how would the electric force be affected.
Analysis on humanistic theory and existential theory : I am writing an analysis on humanistic theory and existential theory. Maslow established humanistic theory and May develop existential theory.
Describe the difference between markups and commissions : Describe the difference between markups and commissions and fees in the advertising business world
Find the npv : Machine used has a 3 year tax life, depreciated by the straight line method over the 3 year life and would have zero salvage value, no new capital required.
Determining entropy of ciphertext message : A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?
Calculate the charge on the ion : A Carnot engine takes in heat from a reservoir at 470°C and releases heat to the lower-temperature reservoir at 200°C. What is its efficiency.
Psychodynamic theory and trait-theory : In the matrix, be sure to analyze how Jenny in the film Forrest Gump demonstrates the five components of her personality from the perspective of Psychodynamic theory and trait-theory.
Describe when you should use visuals in your correspondence : Describe when you should use visuals in your correspondence and some specific ways to create effective visuals
Determine the total cost to company : Pension Fund project which will be offered in 5 years, company purchases zero coupon U.S. Treasury Trust Certificates which mature in five years, when originally issued they were 12 percent coupons.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Compute total time required to transfer file

Compute the total time required to transfer a 1000KB file on a 1Mbps link with an RTD of 100msec ans a packet size of 1 KB in the following cases.a).

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  Bandwidth of mbps ethernet link if signal-to-noise ratio

Using the frequency definition of bandwidth, what should the bandwidth of 10 Mbps Ethernet link be if the signal-to-noise ratio is 20 dB?

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Explaining configuration of http and nntp in organization

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - Web, NNTP (Network News Transport Protocol). How do they figure into organizational security?

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Research various features that were added to ipv6 protocol

Take the time to research the various features that were added to the IPv6 protocol (compared to IPv4). Choose one feature and provide a brief explanation of its benefits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd