Determining entropy of ciphertext message

Assignment Help Computer Networking
Reference no: EM1353128

1) A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable. A crypto device encrypts each message into 20 bits of ciphertext.

a. What is the entropy of the plaintext message?
b. What is the entropy of the ciphertext message?
c. Is this a good cryptosystem? Why or why not?

Reference no: EM1353128

Questions Cloud

Estimate the necessary length of wire : Two identical point charges are fixed distance from one another. If one of their charges was doubled an the other was halved, how would the electric force be affected.
Analysis on humanistic theory and existential theory : I am writing an analysis on humanistic theory and existential theory. Maslow established humanistic theory and May develop existential theory.
Describe the difference between markups and commissions : Describe the difference between markups and commissions and fees in the advertising business world
Find the npv : Machine used has a 3 year tax life, depreciated by the straight line method over the 3 year life and would have zero salvage value, no new capital required.
Determining entropy of ciphertext message : A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?
Calculate the charge on the ion : A Carnot engine takes in heat from a reservoir at 470°C and releases heat to the lower-temperature reservoir at 200°C. What is its efficiency.
Psychodynamic theory and trait-theory : In the matrix, be sure to analyze how Jenny in the film Forrest Gump demonstrates the five components of her personality from the perspective of Psychodynamic theory and trait-theory.
Describe when you should use visuals in your correspondence : Describe when you should use visuals in your correspondence and some specific ways to create effective visuals
Determine the total cost to company : Pension Fund project which will be offered in 5 years, company purchases zero coupon U.S. Treasury Trust Certificates which mature in five years, when originally issued they were 12 percent coupons.

Reviews

Write a Review

Computer Networking Questions & Answers

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  Voip beneficial to an organization

Conduct Internet search to locate case study which illustrates how VoIP was beneficial to the organization. Why did organization need a VoIP solution?

  Analogous steps in dimensioning computer network

Write down the analogous steps in dimensioning a computer network?

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  Explaining significant obstacle to encryption

It is significant to know what issues are for encrypting data in the database. Comment on what you think is most significant obstacle to encryption. Describe your position.

  Explaining security-aware caching resolver

Suppose a security-aware caching resolver receives DNS RRset at time t0 with signatures on it which expire at time t1 (where t0

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Characteristics or issues pertinent in implementing system

What characteristics or issues would be pertinent or applicable for implementing this system? Be sure to discuss political, socio-economic, language, currency, educational and any other issues you think are pertinent.

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Networking beneficial to a professional in career field

How is networking beneficial to a professional in any career field?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd