Question

In: Computer Science

sender needs to send the four data items: 0x3456, 0xABCC,0x02BC, and 0xEEEE. 1. What is the...

sender needs to send the four data items: 0x3456, 0xABCC,0x02BC, and 0xEEEE.


1. What is the checksum at the sender site, receiversite (if there is no error)?


2. What is the checksum at the receiver site if thesecond data item is changed to 0xABCE?


3. What is the checksum at the receiver site if thesecond data item is changed to 0xABCEand            the third data item is changed to 0x02BA?


I don't understand how to formulate the items to get achecksum at the sender or receiver site?


Solutions

Expert Solution


Related Solutions

A sender needs to send the five datawords 0xAABE3, 0xF6DD1, 0x3D1CF, 0x3CFF0, and the last 5...
A sender needs to send the five datawords 0xAABE3, 0xF6DD1, 0x3D1CF, 0x3CFF0, and the last 5 digits of your student ID (put them as is no need to convert them to hexadecimal). Answer the following: 3.1) Find the checksum at the sender site. 3.2) Find the checksum at the receiver site if there is no error. 3.3) Find the checksum at the receiver site if the first dataword is changed to 0x1245A. Last digits of ID : 70664
A sender needs to send the five datawords 0xBD74, 0xC56D, 0xFD1F, 0xF3CF, and the last 4...
A sender needs to send the five datawords 0xBD74, 0xC56D, 0xFD1F, 0xF3CF, and the last 4 digits of your student ID(984) (put them as is no need top convert them to hexadecimal). Answer the following: 3.1) Find the checksum at the sender site. 3.2) Find the checksum at the receiver site if there is no error. 3.3) Find the checksum at the receiver site if the third dataword is changed to 0xF003
Q2.1 [RSA Signature Scheme] (Marks: 2) Suppose Bob (the sender) wants to send a message m=123456...
Q2.1 [RSA Signature Scheme] (Marks: 2) Suppose Bob (the sender) wants to send a message m=123456 to Alice (the receiver). However, before sending the message he would like to sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 5563 and q...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
this is data structures with C++ language, please do "#1 & a" separately and please send...
this is data structures with C++ language, please do "#1 & a" separately and please send me copyable file 1. Write a program that allows the user to enter the last names of the candidates in a local election and the votes received by each candidate. The program should then output each candidate's name, votes received by that candidate, and the percentage of the total votes received by the candidate. Assume a user enters a candidate's name only once and...
1) A company that wants to send data over the Internet will use an encryption program...
1) A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
When encrypting data, we must ensure that both the sender and the receiver are in possession...
When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total) i. Name each type and briefly explain how they are different? ii. Name one popular algorithm used for each type of encryption. iii. A user would like to send a long,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT