How many possible keys are embodied in the final cipher text

Assignment Help Computer Network Security
Reference no: EM131248918

Vigenère and transposition:

Suppose a Vigenère cipher is constructed with a key that is three letters long. The result of this first encryption is further encrypted with a Vigenère cipher, with another three-letter key.

(a) How many possible keys are embodied in the final cipher text?

(b) Suppose that after the first Vigenère encipherment, the resulting text is transformed by a transposition code that reads the text into a three by three matrix row by row and reads it out column by column after the columns are permuted. Effectively how many possible keys are embodied in the resulting double-encrypted cipher text?

(c) Suppose that after the Vigenère encryption and the transposition encryption, the text is subjected to another Vigenère cipher with a key of length 3. How many possible keys are embodied in this final result?

(d) Suppose that after the first Vigenère cipher, the transposition cipher, and the second Vigenère cipher, the transposition is reversed (perhaps because the transposition key is discovered). The result is then equivalent to a compound Vigenère cipher. What is the length of the keyword in this compound Vigenère cipher?

(e) How many possible keys are embodied in this compound Vigenère cipher?

Reference no: EM131248918

Questions Cloud

Faculty-approved organization : Write a 1,050- to 1,400-word paper using the faculty-approved organization from Week 1 in which you:
How many keys are there in this compound cipher : An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are there in this compound cipher?
How should federal law enforcement engage state : What federal and state agencies are required to deal with an MCI resulting from a terrorist attack? Why? How do you distinguish between federal and state authorities for both operational and management functions? Explain. How do you ensure a fusion o..
Define computer protection strategies of physical security : Outline the theoretical premises underlying crime prevention through environmental design (CPTED). Discuss the relationship between CTPED, communities, and community- and problem-oriented policing. Use two current events to assist you in evaluatin..
How many possible keys are embodied in the final cipher text : How many possible keys are embodied in the final cipher text? - how many possible keys are embodied in the resulting double-encrypted cipher text?
Example company for each of business models below : Please find one example company for each of the business models below, and one small paragraph to explain the features of the companies that makes you think they are using these business models. A total of one page is enough. Thank you.
What is the problem as ong sees it : "Yeast" Guided Reading Questions - Write down all the words you didn't understand.  Now, define them.  What is the problem, as Ong sees it
Impact of special offenders on prison population management : Select an article from a scholarly journal and write a 2- to 3-page reaction paper about the article. Address the following issues in your paper: The process of offender supervision consists of four general stages: assessment, diagnosis, recidivi..
Transactions carried out by waiz sdn bhd : The transactions below were carried out by Waiz sdn bhd for the month of Jun 2015 - Started business with RM15,000 cash and a Van valued at RM25,000.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  Calculate sales tax in cell e36 by multiplying the tax rate

On the Stock Investments worksheet, pull in the current stock prices from finance.google.com.On the right side of the page, you will find the World markets section. Select that data to be imported into the worksheet. Make sure you place it in the ..

  Find an united states based online article regarding it risk

Find an United States based online article (or resource) regarding IT risk assessment, cyber law, OR auditing

  How has the role of private security changed since the 911

1. how has the role of private security changed since the 911 attacks?what are some of the roles that private

  Write a succinct policy statement specifying employee

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Why it important that companies implement security policies

Why is it important that companies implement security policies? Should be three pages, follow APA formatting guidelines, and include an abstract and conclusion.

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  List and explain key objectives of information security

Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd