Security staff on encryption techniques

Assignment Help Basic Computer Science
Reference no: EM13802708

Assignment

You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.

Use a 2-stage transposition technique to encrypt a message. The following information is what is needed to do this encryption: 

  • Key: 2314746
  • Message: The transposition cipher technique works by permuting the letters of the plaintext. It is not very secure, but it is great for learning about cryptography (ignore the comma and the period in the message). 

In a 2-3-page paper, demonstrate this encryption and how you arrived at your answer.

In addition, answer the following questions:

  • Is it possible to decrypt the message with a different key? Justify your answer.
  • Do you agree with the statement of the message? Provide examples to support your view.  

Be sure to reference all sources using APA format.

 

 

Reference no: EM13802708

Questions Cloud

Design a grade average program : Grade Average Program - Design a grade average program that will produce the numerical grade average of test scores input by a user
Per-foot downward pitch of a horizontally running drain : What is the minimum recommended per-foot downward pitch of a horizontally running drain, vent, or sewer line?
Different types of switching used in data transmission : Compare or contrast the different types of switching used in data transmission. How many are there? What factors separate one from the other? Please elaborate.
Design a calculator program : Design a calculator program that will add, subtract, multiply, or divide two numbers input by a user. Your program design should contain the following: The main menu of your program is to continue to prompt the user for an arithmetic choice until th..
Security staff on encryption techniques : You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.Use a 2-stage transpo..
Create example c++ code based on working logical flow chart : Use the generate dropdown to create example C++ code based on your working logical flow chart. Also attached the code in a Microsoft Word file or a text file
Ethics in your agency or organization : Ethics in Your Agency or Organization
How polymorphism might be used in a system : Discuss a real-world example of how polymorphism might be used in a system you are familiar with
Scripts to automate user and group maintenance : Need assistance and examples to start a report based upon the following information generated from any UNIX like interface, preferably Ubuntu or Cygwin. Need UNIX scripts for the following actions: (1) A script to automate the shutdown process and a ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Required value for the move command

Shape_index is a required value for the move command. It is the index of the shape in the shape data arrays that you wish to move. It should range between 0 and MAX_SHAPES - 1. Be sure to validate the index.

  Differentiate matrix and blosum matrix

Write down the difference between matrix and a Blosum60 Blosum20 matrix? If one uses one and when other? What is meant by Clustal and summarize the operation.

  Develop a framework for the it steering committee

Develop a framework for the IT steering committee, explaining the roles and responsibilities of the members.

  Creating a hashing function

Suppose you are creating a hashing function to use for storing string data in hashtable. One Candidate hasing function would be to sum the ASCII or Unicode values for each character, and that result as the hashcode.

  Suppose that you are connected to a database termed

assuming that you are connected to a database called computers.mdb with the fields computer hostname roomnum cputype

  What is virtual memory

What is virtual memory and how is it related to the swap partition in Unix?

  Critical infrastructure protection

According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Create logic circuit which will decode dtmf-like keypad

Create the logic circuit which will decode the DTMF-like keypad. The keypad comprises of 16 keys, numbered 0 to 9, *, #, A, B, C, and D.

  Create a table consisting of each integer and its square

Write the MATLAB statements required to calculate and print out the squares of al the even integers between 0 and 50. Create a table consisting of each integer and its square, with appropriate labels over each column. I MUST use a while loop but I..

  A cyber stalker and you are going to stalk

A cyber stalker and you are going to stalk yourself.

  Use the supplied superclass car to create classes

Because Toyotas are superior to Fords or Chevys it should also implement the supplied Airplane interface. Give the methods something to do. I would suggest a println method since you can then see that the method actually ran.

  Expalining independent of choice of a dbms

Which of the following is independent of the choice of a DBMS?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd