What is the entropy of the plaintext message

Assignment Help Computer Network Security
Reference no: EM13329025

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable. A crypto device encrypts each message into 20 bits of ciphertext.

a. What is the entropy of the plaintext message?

b. What is the entropy of the ciphertext message?

c. Is this a good cryptosystem? Why or why not?

 

Reference no: EM13329025

Questions Cloud

Compute the current fair value of the bank note syndicated : The loan is secured by the company's assets and subject to financial and other covenants, including a requirement that the company maintain a total debt ratio not exceeding 1.5:1
Explain propionic acid and methyl acetate are isomers : Propionic acid and methyl acetate are isomers. Which has the higher boiling point and why? Which one would have the greater Rf value on TLC? Why
This money does not go into the economy : Sp represents personal savings. This money does not go into the economy. So why is it counted in this formula?
What is the tangential speed of the puck : An air hockey puck is attached to a string with a length of .45 m and is set in a circular motion with a period of 2.0 s. What is the tangential speed of the puck
What is the entropy of the plaintext message : A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.
Explain conditional formation constant for ca(edta)2 : Find the conditional formation constant for Ca(EDTA)2- at pH 9.00, where log Kf is 10.65 and ?Y4- is 0.041.
Determine the centripetal acceleration of the car : A car with a mass of 1234 kg is travelling around a circular track with a radius of 100.m and a tangential velocity of 23 m/s. Determine the centripetal acceleration of the car
While the total revenue of that good increases by 15 percent : A price change causes the quantity demanded of a good to decrease by 30 percent , while the total revenue of that good increases by 15 percent. Is the demand curve elastic or inelastic ? Explain?
Determine what is the stocks growth rate per share : A firm's recent dividend was $2.00 per share. The stock is selling in the market place for $50.00 per share. If investors are demanding 10% on this stock, what is this stock's growth rate

Reviews

Write a Review

Computer Network Security Questions & Answers

  Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a).

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  Determine the encrypted message-s entropy

If this message is sent unencrypted and successfully received, determine its entropy? If this message is encrypted with DES using random 56-bit key, determine the encrypted message's entropy?

  Explain problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Solve problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures

  Assume a propagation speed

Review the car-caravan analogy in Section 1.4. Again assume a propagation speed of 100km/hour

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd