Describe your cryptanalysis process

Assignment Help Computer Network Security
Reference no: EM131445880

Assignment

1) If an attacker has a copy of the cipher text and its content yields no information at all with regard to the plain text message, the text is considered _____________.
a) cipher perfect
b) third-eye blind
c) perfectly secure
d) third-party secure

2) Which is not a weakness of a shift cipher? _________________________
a) Once you have the code book you can decode the message.
b) Natural language letter frequency makes them easy to decode.
c) The number of letters in the alphabet makes them easy to decode.
d) Once the shift is determined the message is decoded almost instantly.

3) Quantum cryptography is based on the physics of light. True/False,

4) Claude Shannon presented the encryption design principles of _________________.
a) multiplication and factoring
b) exponentiation and Logarithms
c) confusion and diffusion
d) perplexion and reflection

5) Two numbers are said to be congruent if _____________________.
a) one is a multiple of the other
b) they produce the same remainder after modulo division
c) they have the same prime number as a factor
d) they are quotients of the same number

6) A good hash function creates _________ mapping between the source string and the output string.
a) complex
b) as many as needed
c) divisional
d) one to one

7) A number is relatively prime to another if they _____________.
a) have only each other as factors
b) have no prime factors in common
c) only have one prime factor in common
d) are both divisible by 7

8) The following is aciphertext:

a) U GIRJ CFJ SWAY. SWAY UR JQW GUCB-TUDDWY. SWAY UR JQW DUJJDW-BWAJQ JQAJ LYUCPR JFJAD FLDUJWYAJUFC. U NUDD SAKW GM SWAY. U NUDD EWYGUJ UJ JF EARR FOWY GW ACB JQYFIPQ GW. ACB NQWC UJ QAR PFCW EARJ U NUDD JIYC JQW UCCWY WMW JF RWW UJR EAJQ. NQWYW JQW SWAY QAR PFCW JQWYW NUDD LW CFJQUCP. FCDM U NUDD YWGAUC - SYACT QWYLWY

b) What kind of cipher text is this? Mono- or Poly alphabetic; Hint: assume one and when that does not work look for the other

c) Describe your cryptanalysis process. Show all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.

d) State the plain text message.

e) List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features

Note: Only a decrypted message even if it is correct without the methodology and the detailed description of the self-explanatory steps used to decrypt, would not get points.

Reference no: EM131445880

Questions Cloud

Discuss about the police department budgeting : After reading Police Department Budgeting: A Guide for Law Enforcement Chief Executives , critique the strategies suggested there and explain how you would apply them to creating a police budget in your own community.
Relationship between two financial variables : Develop a general report highlighting your findings and recommendations to the investor. Be sure to link your findings to relevant economic and financial theories
Describe what you have learned from the course : : As you prepare to write your answer to the discussion question, think about the general education courses that you have taken as a university student. To help you address the prompts, carefully read the Week One required resources that address t..
Other than executory arbitration : Other than executory arbitration, Are there any other alternatives worth considering when it comes to pre established agreements for employers?
Describe your cryptanalysis process : Describe your cryptanalysis process. Show all the steps you went through to decrypt message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.
Complete all the applicable parts of the tax forms : Complete the attached template that has the respective tax forms (page 1 of form 1040 and schedules) to complete the tax return. Complete all the applicable parts of the tax forms
Challenges of it management : Create an initial post in which you investigate examples of IT failure trends
Requirements for a similar job role : Josh works as a clerical assistant in a law firm located in a small town. He is not satisfied with the pay provided to him. His company is only one of two firms located in the town, and the other firm does not have requirements for a similar job r..
Write a paper for a chief-other criminal justice executive : The student's task is to place yourself in the position of a member of a Criminal Justice planning staff; to review an approved agency problem; to summarize some research on the topic, and to write a paper for a chief or other criminal justice exe..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design a redis database to hold a list of ads

Design a Redis database to hold a list of ads and their attributes from statecollege.com auto listings. Choose the attributes and information present in the ads.

  Explain why you were unable to complete this part

Modify the attached code to include a exportToJSON method within the Cave object. This method should output the JSON version of our Cave, which should be identical to the JSON within Cave.dat for that particular Cave.

  Analyze the impact of security breaches

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

  Create more secured network infrastructure for the company

You are part of a telecommunication company that provides network and security solutions in different fields. You have been called by a client to plan and design the network system for the company. The idea of this project is create more secured n..

  Write down a 1000- to 1500-word paper on at least three

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Which will encrypt each users data in a file

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.

  Assignment on evaluating access control methods

Assignment On Evaluating Access Control Methods, Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of acc..

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

  Research the debate over activex controls

Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past regarding ActiveX controls?

  How do nist criteria for selection of des and aes

How do NIST criteria for selection of DES and AES relate to Shanon's original standards of a good cryptographic system? What are the significant differences? How do these standards reflect a changed environment many years after Shannon wrote his s..

  Analyze the significance of hacking

Analyze the significance of hacking in organizations and modern society. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd