What is the entropy of the plaintext message

Assignment Help Computer Network Security
Reference no: EM13329025

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable. A crypto device encrypts each message into 20 bits of ciphertext.

a. What is the entropy of the plaintext message?

b. What is the entropy of the ciphertext message?

c. Is this a good cryptosystem? Why or why not?

 

Reference no: EM13329025

Questions Cloud

Compute the current fair value of the bank note syndicated : The loan is secured by the company's assets and subject to financial and other covenants, including a requirement that the company maintain a total debt ratio not exceeding 1.5:1
Explain propionic acid and methyl acetate are isomers : Propionic acid and methyl acetate are isomers. Which has the higher boiling point and why? Which one would have the greater Rf value on TLC? Why
This money does not go into the economy : Sp represents personal savings. This money does not go into the economy. So why is it counted in this formula?
What is the tangential speed of the puck : An air hockey puck is attached to a string with a length of .45 m and is set in a circular motion with a period of 2.0 s. What is the tangential speed of the puck
What is the entropy of the plaintext message : A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.
Explain conditional formation constant for ca(edta)2 : Find the conditional formation constant for Ca(EDTA)2- at pH 9.00, where log Kf is 10.65 and ?Y4- is 0.041.
Determine the centripetal acceleration of the car : A car with a mass of 1234 kg is travelling around a circular track with a radius of 100.m and a tangential velocity of 23 m/s. Determine the centripetal acceleration of the car
While the total revenue of that good increases by 15 percent : A price change causes the quantity demanded of a good to decrease by 30 percent , while the total revenue of that good increases by 15 percent. Is the demand curve elastic or inelastic ? Explain?
Determine what is the stocks growth rate per share : A firm's recent dividend was $2.00 per share. The stock is selling in the market place for $50.00 per share. If investors are demanding 10% on this stock, what is this stock's growth rate

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd