How many keys are there in this compound cipher

Assignment Help Computer Network Security
Reference no: EM131248921

Affine ciphers:-

Let a be an integer between 1 and 26, and let x be the integer corresponding to one of the 26 letters of the alphabet. The corresponding linear cipher transforms the message x into the cipher text y by

For example, if a = 3 and the message is "d," the cipher text is y = 3 × 4 = 12. If the message is "k," the cipher text is y = 3 × 11 mod 26 = 33 mod 26 = 7. To be acceptable, the value of a must be invertible mod 26, such that the correspondence from x to y can be uniquely inverted. A case that does not have this property is a = 4, for then both x = 3 (for "c") and x = 16 (for "p") lead to y = 12. An a is invertible if it has no common factor, other than 1, with 26. Hence, 4 is not invertible since both 4 and 26 share the factor 2. (See section 13.5.)

(a) List the acceptable values of a.

(b) Decipher the following linear cipher text:

(c) An affine cipher is of the form y = ax+b mod 26, where both a and b are integers between 1 and 26, with a being one of the values in part (a). How many keys are there in affine ciphers?

(d) An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?

Reference no: EM131248921

Questions Cloud

Find the inverse of the a matrix : Hill devised a cipher that extends both transposition and linear ciphers. - Find the inverse of the A matrix given above.
Obtain the panel iv estimator in the pe model : For example, for variable x, type by id: egen avex mean(x) followed by summarize x and then generate mdx = x - avex + r (mean). Verify that you get the same estimated coefficients as you would with xtivreg, f e.
What was the number of victims killed and wounded : What psychological symptoms are exhibited by direct attack victims? If one is available, include a diagnosis. What psychological symptoms are exhibited by indirect victims, such as family members, friends, and coworkers of the direct victims? What ..
Faculty-approved organization : Write a 1,050- to 1,400-word paper using the faculty-approved organization from Week 1 in which you:
How many keys are there in this compound cipher : An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?
How should federal law enforcement engage state : What federal and state agencies are required to deal with an MCI resulting from a terrorist attack? Why? How do you distinguish between federal and state authorities for both operational and management functions? Explain. How do you ensure a fusion o..
Define computer protection strategies of physical security : Outline the theoretical premises underlying crime prevention through environmental design (CPTED). Discuss the relationship between CTPED, communities, and community- and problem-oriented policing. Use two current events to assist you in evaluatin..
How many possible keys are embodied in the final cipher text : How many possible keys are embodied in the final cipher text? - how many possible keys are embodied in the resulting double-encrypted cipher text?
Example company for each of business models below : Please find one example company for each of the business models below, and one small paragraph to explain the features of the companies that makes you think they are using these business models. A total of one page is enough. Thank you.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  Search the internet for one instance of a security breach

search the internet for one instance of a security breach that occurred for each of the four best practices of access

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Write the different techniques use in detecting intrusion

Explain in detail about system security and write down the different techniques use in detecting intrusion. Explain the answer must be accompanied by algorithm.

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

  Evaluate the strengths and weaknesses of the organizations

Evaluate the strengths and weaknesses of the organizations cybersecurity policy along attributes - Analyze the range of organizational policies (the policy framework) that are needed to effectively manage cybersecurity risks.

  Analyze in the context of what you have learned

Consider a recent (2014, 2015 or 2016) security breach popular in the media. Analyze in the context of what you have learned. You can review "The six dumb ideas" http://www.ranum.com/security/computer_security/editorials/dumb/

  What is the name of the certificate issuing authority

What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.

  Summarize the primary vulnerabilities and potential threats

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Explain primary tasks high-level investigation processes

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd