How many bits is the encrypted message

Assignment Help Computer Network Security
Reference no: EM13190772

1. ASCII code is a fixed-length coding scheme. Using the 7-bit ASCII code table [3] or any other references, find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit (MSB), for example your name is Xxxx Ssss, the first letter is X, its ASCII is 1011000, adding 1 to the left position of MSB yields to 11011000. These bits sequence is the message that you will encrypt using the Simplified DES algorithm.

2. Based on the understanding of Q3 of Bart B, use the 10 bits password (1100110010) to generate the keys (K1 and K2).

Your answer should be detailed, you should show each output of each step of the algorithm besides the final answers.

3. Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

Your answer should be detailed, you should show each output of each step of the algorithm besides the final answer.

4. How many bits is the encrypted message?

Reference no: EM13190772

Questions Cloud

Multinational stage of corporate international development : The multinational stage of corporate international development transcends any single home country. The ownership, control, and top management tend to be dispersed among several nationalities.
Nucleophilic substitution will predominate over elinmation : What are the conditions where Nucleophilic Substitution will predominate over elinmation? ALSO What are the conditions of solvent, temperature
How many cups of salt should added to five cups of mixture : How many cups of salt should be added to five cups of mixture A so that the resulting mixture has equal amounts of salt and pepper?
Will efforts unambiguously help unions american workers : American unions often try to win public support for boycotting goods made in less-developed countries by workers who work very long hours at low pay in unhealthy conditions.  If successful, will these efforts unambiguously help the targeted foreign..
How many bits is the encrypted message : How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit
How many items would need to be stocked : In an inventory study it was determined that on average demands for a particular item at a warehouse were made four times per day. What is the probability that on a given day an item is requested.
State what are the complete and net ionic equations : What are the complete and net ionic equations for silver nitrate and potassium iodide in a double displacement
Acquiring and developing the project team : Examples of ____ include acquiring and developing the project team, performing quality assurance, distributing information, managing stakeholder expectations, and conducting procurements.
State coefficients in solubility-product expression : Include activity coefficients in your solubility-product expression. The Ksp of Hg2I2 is 4.6× 10-29.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

  A virus is a program that attaches itself to other programs

A virus is a program that attaches itself to other programs. An infected user must take some sort of action to spread a virus to others. A worm functions as an independent program

  Research paper about data encryption techniques

Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Potential threats to a bank using mobile technology

Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in terms of severity and likelihood- ITECH3215-7215

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd