Find the automorphism group of the repetition code

Assignment Help Computer Network Security
Reference no: EM131015608

1. Caesar Substitution Cipher. Recall that a Caesar shift cipher identifies (A, B,... , Z) with Z26 = (00, 011 ... 25) and enciphers using a shift x → (x + k) mod 26 for some private key k. Knowing this, decipher

HSS PZ MHPY PU SVCL DHY HUK JYFWAVNYHWOF

2. RSA Cryptosystem. An RSA cryptosystem has public key (1050958331,1019). It enciphers text in 3-character (9-digit) blocks, with each text character identified with its 3-digit ASCII code (see pg 3 of our handout Common Alphabetic Substitution Codes). For example, the 3-character plaintext string "Abz" is identified with the 9-digit string 065098122 of ciphertext, which is then enciphered using the RSA public key.

You intercept the message 652557294 075733184 encrypted with this public key. Can you decipher it?

(Hint: This problem will require some computer calculations. WolframAlpha has a "Phi(n)" function, and the modular arithmetic calculator site given on Assignment 4 can also be used.)

3. Suppose C ⊆ Fq(n) is a linear code of length n over Fq. The automorphism group of the code C is

Aut(C) = {g E G L(n, q) : gC = C}.

(a) Prove that Aut(C) is a group.

(b) Find the automorphism group of the repetition code {000,111} of length 3 over F2.

4. Recall that the nonlinear S-boxes in AES make use of a natural bijection between the field F28 and the group algebra F2 C8 which has no algebraic realization.

(a) Prove that F2C8 is not a field.

(b) How much can be said about the algebraic structure of F2C8 using the CRT for polynomials?

5. A cyclic linear code of length 6 over F5 has generator polynomial g(x) = x3 + 2x2 + 2x + 1. Text characters are encoded using the base 5 representation of their standard ASCII decimal number. For example B = 66 = 231 base 5 is identified with the message m(x) = 2x2 + 3x + 1, then encoded as g(x)m(x).

Suppose you receive the two character message

2x5 + 3x4 + x2 + 3, 2x4 + 2x3 + 3x2 + 4x + 4.

(a) Show that the first character in the received message is most likely error-free, and decode it.

(b) Show that the second character of the received message contains errors. Find the most likely error, decode it, and obtain the 2-character message.

6. One technique for creating regular LDPC codes is to use the incidence matrix of the Cayley graph of a group G with a relatively small generating set of involutions S. Vertices are the elements of the group, and there is an edge between x and y if x = ys for some s ∈ S.

(a) Recall that the dihedral group D10 is generated by two involutions a, b satisfying a2 = b2 = e and (ab)5 = a Draw the Cayley graph associated with (D10, {a, b}). Find the 5 x 10 parity check matrix H for the LDPC code associated with this graph.

(b) In the LDPC code associated with the Cayley graph (D10, {a, b}), the message nodes are, f1, ....... f5 where fi = (ab)i, i = 1,......5, and the check nodes are ci = fi,a i = 1,.......5. For a message to be valid, the value of each message node should be the sum modulo 2 of the values at the check nodes that are connected to it.

In the LDPC decoding algorithm, the values of message nodes and check nodes are passed back and forth and adjusted to the most likely state at each stage. First the values of the h's are used to determine a list of likely values for each of their check nodes, then check nodes are adjusted to their most likely value, and then the new values of these ci's are used to adjust the values of the fi's.

If the received values are f1f2f3f4f5c1c2c3c4c5 = 0101100110, find the most likely actual message after one pass back and forth through the LDPC graph decoding algorithm. Use the parity check matrix to verify that this is a code-word.

7. Reed-Solomon Code. An RS-(7,3,5) code has length 7 and dimension 3 over F23 = F2(ζ), where (ζ3 = ζ + 1. The code has designated distance 5, so the generating polynomial is g(x) (x + ζ) (x + ζ2) (x + ζ3)(x + ζ4) F23 [x]. 8-bit hexadecimal ASCII symbols are first encoded as 9-bit strings by adding a check digit:

For example: N = 4E in 8-digit ASCII becomes 010011100 as a 9-bit string, which is represented as the message polynomial m(x) = (x2+((+1)x-F(2. It is desirable in transmission that the first part of the transmitted message contains the actual message. The first three blocks of the transmitted message is x4m(x), and the last four blocks are the remainder r(x) of x4m(x) divided by g(x).

Calculate the transmitted message c(x) = x4m(x) + r(x) that would be associated with the plaintext symbol ± = B1 in extended ASCII, and write this as a 21-bit binary string.

8. RS decoding. In the RS-(7,3,5) code of exercise 7, the 21-bit string 001010100111000001011 is received. Determine the most likely intended plain-text message symbol. How many bit errors occurred? How many symbol errors?

Reference no: EM131015608

Questions Cloud

How is the value of it assessed in your organization : What is the level of IT-business integration for your organization? How is the value of IT assessed in your organization? How might your organization improve IT strategic alignment with business
Calculate the amount of the revised annual payment : A man has a 30-year loan with level end of year payments. The principal repaid in year 5 is 159.68 and in year 10 is 213.73. What is the payment - What was the nominal interest rate convertible quarterly for the last 2 years?
Comparing walmart and amazon business models : Analyze the case study comparing Walmart and Amazon's business models and business strategies
What is the value of the inductance l : The figure shows voltage and current graphs for an inductor. What is the emf frequency f? What is the value of the inductance L?
Find the automorphism group of the repetition code : Find the automorphism group of the repetition code - How much can be said about the algebraic structure and show that the first character in the received message is most likely error-free.
Write an integral for the total force exerted by the water : Write an integral for the total force exerted by the water on one side of the plate. Use δ for the mass-density of water and g for the acceleration due to gravity.
How fast are the trains moving at three pm : A train starting at noon, travels east at 50 mph while another train leaves an hour later from the same point traveling north at 90 mph. How fast are the trains moving at 3 pm?
Find units that should be sold in order to maximize profits : Find the units that should be sold in order to maximize profits using (a) 1st derivative test (b) 2nd derivative test (C) fermat points method.
How can you ensure a group is communicating effectively : In a virtual meeting, how can you ensure a group is communicating effectively?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  Identify the key features of the affordable care act

Identify the key features of the Affordable Care Act

  Encryption in investigations

Encryption in Investigations-Discuss in your own words the effects that encryption can have on incident response activities, and explain how the use of encryption technologies could prove to be detrimental to an investigation

  Cryptography methods to protect organizational information

Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

  Companys needs for these types of security

Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references -

  Coding of binary information and error detection

Coding of Binary Information and Error Detection

  Tools and techniques used to impact web applications

Tools and techniques used to impact web applications. What are some of the motivations behind these attacks

  What can employees do to protect against attacks

What can employees do to protect against intrusion and attacks? Complete the following for this assignment:Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  What was the volume of digital evidence

Select a real world event related to Cybersecurity. This could be a crime, a well-documented breach or intrusion, or an act of cyber warfare/espionage.Needs to be 10 pages.APA format along with no plagiarism. Will be run through plagiarism site ..

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Explain the implications of the risks and techniques

Briefly describe how computers and humans can pose risks to infrastructure assets. Explain the implications of the risks and techniques on critical infrastructure sectors

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd