Computing minimal length of key-average cracking time given

Assignment Help Data Structure & Algorithms
Reference no: EM1345827

Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher which uses a 56-bit key. The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach. The average time to crack the message is found to be 2 hrs. As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 56 to 64 bits. They then conduct another challenge. What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase average cracking time to at least 100 years, determine the minimal length of the key?

Reference no: EM1345827

Questions Cloud

Explain how have audiences been impacted by new technology : Show how the proliferation of social media has changed leader communications and explain how have audiences been impacted by this new technology?
Statements of cash flows : Pick three companies from different industries and situate their statements of cash flows for the most recent year.
Computing entropy of plaintext message : Compute the entropy of the plaintext message?
Explain ranking differences and similarities : Maximizing shareholder returns usually implies that the firm must also satisfy customers, creditors, employees, suppliers, and other stakeholders.
Computing minimal length of key-average cracking time given : If Encrypt-It-Rite would like to increase average cracking time to at least 100 years, determine the minimal length of the key?
Describe the coefficient of determination : Describe the coefficient of determination. Suppose if you were given that the independent variable was 5, what would the predicted value be.
Explain the events that occur as water molecules : A speed skater moving across frictionless ice at 8.4 m/ s hits a 5.2 m -wide patch of rough ice. She slows steadily, after that continues on at 6.3 m/s.
Financing return on investment : My uncle is working in a corporation managing investment center. I approached him with sales of a large piece of equipment that can help firm save money in the end.
Protecting against foreign exchange risk : Illustrate out the foreign exchange risk? What specific problems does foreign exchange present in an organization? How could an organization needing Euros in six months protect itself from currency fluctuations?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Explain the sorting techniques selection sort

Explain the following sorting techniques using appropriate algorithms- (i) selection sort (ii) bubble sort

  Survey of fault tolerance policy for load balancing scheme o

This paper investigates about fault-tolerance in load balancing schemes in distributed environment. There are some more parameters influencing QOS but our main focus is on fault tolerance and load balancing.

  Discuss new security features in windows server

Which of the system changeover methods is the most expensive? Why? Which of the system changeover methods is the most risky? Why?

  Create a binary search tree program

Creating a Binary Search Tree program - Finding the largest and smallest values in the tree Add two class methods

  Write the selection sort algorithm

Write the selection sort algorithm

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Algorithm to divide sixteen digit value by six digit integer

Divide 16 digit value N by six digit integer D obtaining quotient Q and remainder (or sign of the remainder) R by division algorithms.

  Factors-principles considering indecency regulation issues

What factors and principles should the federal government take into account when considering indecency regulation issues?

  Data structures for a single algorithm

Data structures for a single algorithm

  Algorithm to produce a list of customers

Draw an algorithm to produce a list of customers from the Glad Rags Clothing Company's customer master file.

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Implementation of graph

Give the two input nodes after the graph has been built from the command prompt.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd