Encrypt and decrypt message cryptography, Computer Networking

Assignment Help:

Submission instructions: Answer the following questions using a text processing software and submit your answers via connex. Possible file formats for your submission file(s) are .pdf, .doc, and .pages. Rough work can be submitted as .jpeg, .gif, .pdf, or inserted into your main document. This assignment is worth 5% of your final grade and it is marked out of 100 marks.

Part 1: Cryptography

1) Encrypt the following message using Caesar's Cipher, and a key of +7:

2) Decrypt the following message using Caesar's Cipher, and a key of +12:

3) Decrypt the following message using Caesar's Cipher. Since you have no key, you will have to break the cipher. For full marks, show your work.

4) Encrypt the following using the one time pad using XOR as shown in class:

plaintext: 1100110101111010

key: 1010000101011111

5) Decrypt the following using the one time pad using XOR as shown in class::

ciphertext: 100001010011

key: 110110000111

6) Describe how the encryption process compares from the decryption process with the one time pad.

Part 2: Reflection question

1) Select three topics from the following list of topics we've covered so far in the class, and describe in less than 100 words how each of them played a role in the development of Watson (note Watson will be discussed in class on Thursday, Nov 24th, stand by!).

? Algorithms

? Recursion

? Hardware

? Computability/Uncomputability

? Graph Algorithms

? Computer Graphics

CSC 106 (The Practice of Computer Science) Fall 2011

? Artificial Intelligence

? Cryptography

2) Identify one topic which was not covered in the course which was necessary for the development of Watson

Part 3: Wordpress

Use Wordpress Software (wordpress.com) to create a website about yourself. If this website is not publicly available (and we recommend you protect it unless this is information you would already want to publicly share, make sure you include a password for the marker to access it with. Your site must contain the following three pages:

1. one page about yourself (ideally include a photo)

2. one page about an activity you are interested in

3. one page about a place you are interested in. Describe the place, why you find it interesting, and some specific features (landmarks, geography, culture, for example) that make it unique. For this part you can either describe a place you have visited, or somewhere you wish to visit.

Submit a link to your site through Connex. This is done by clicking or select files from workspace or site on the Assignment Submission page.

For each page you will be evaluated on:

1. content

a. at least 100 words per page. One page may be media oriented with less text, but if that's the case make sure that it tells a story.

b. text must be integrated with media and links (in other words they need to be related to each other)

2. use of wordpress features

a. at least one external link

b. at least one internal link

c. media (overall 3 images, 1 video)

Overall your blog will be evaluated on:

1. choice of template (describe in your assignment why the template you chose is appropriate for your blog)

2. use of at least one sidebar widget that links to an outside source of information (like twitter or flickr for example)

Notes:

? you can make your site private, so that you do not to reveal information about yourself online

? you must create a new wordpress blog specifically for this assignment

? if you include anything that you don't own, make sure to give credit and cite your source.

This does not include external links.

? use the free version of wordpress for this assignment


Related Discussions:- Encrypt and decrypt message cryptography

Explain basic capabilities of mobile ip, Question: a) Describe the tria...

Question: a) Describe the triangular delivery and two crossing problem that appears in Mobile IP. b) Discovery, Registration and Tunneling are three basic capabilities of Mo

Distributed data processing, In distributed data processing, explain two sc...

In distributed data processing, explain two scenarios where vertical partitioning and horizontal partitioning are used. Distributed Data Processing The distributed data pro

Explain the term virtual circuit packet delivery, QUESTION a) Security ...

QUESTION a) Security is a very crucial component in a Distributed System. Describe three properties of a secure channel. b) During packet transmission, messages are subdivid

Performance - application layer, Performance Running on  inexpensive  ...

Performance Running on  inexpensive  hardware oracle web cache  increase the  throughput of  website  by several  orders of magnitude. In  addition  oracle web cache  signific

What are major types of networks and explain, What are major types of netwo...

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network

Explain in brief about the term- daemon, What is Daemon A daemon is ...

What is Daemon A daemon is a UNIX background process that implements the server side of a protocol. Daemons are unique to UNIX. For example, FTP stands for the File Transfer

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

What does a metric of 16 hops showwhen using RIP , Destination unreachable ...

Destination unreachable Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What are the characteristics of client, What are the characteristics of Cli...

What are the characteristics of Client/Server? Service Encapsulation of services Shared resources Asymmetrical protocols Mix-and-match Transparency of location

Brdging between buildings, BRDGING BETWEEN BUILDINGS:  If two building...

BRDGING BETWEEN BUILDINGS:  If two buildings are placed far from each other, a bridge, a pair of fiber modems and an optical fiber may be used to locate two LANs as given in t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd