Question

In: Computer Science

How is a combination lock with two numbers (0 and 1) similar to bit encryption, given...

How is a combination lock with two numbers (0 and 1) similar to bit encryption, given we had the ability to add as many wheels as we wanted?

Solutions

Expert Solution

How is a combination lock with two numbers (0 and 1) similar to bit encryption, given we had the ability to add as many wheels as we wanted?

Working of a combination lock in simplistic terms:

The most common implementation of a combination lock involves a serried of the wheel which is connected to the dial with a horizontal rod-shaped component called SPINDLE. Internally is runs through all the wheels and end at the DRIVER CAM. When we turn the dial spindle which turns the driver cam present at the end. On the driver cam, there is a outward structure called DRIVE PIN which comes into the similar structure of the wheel called FLYWHEEL. When that happens, wheel adjacent to the driver cam rotates and that propagates to the wheel adjacent to the initial one and so on for the rest of the wheels as well.

Now for every rotation made in the dial has a number and a wheel associated with it in the end when the right combination is dialed in all the wheels and their notched lines up exactly. Meanwhile, there is another piece of the lock called FENCE, this sits in between the dial and the drive cams and clocks the path of the bolt that secures the safe door.

When all wheels line up, their notches align and form a gap. In this gap, gravity does its job and fence drops into it. As the combination is right and nothing blocking the lock’s pathway the lock unlocks.

Now coming to the bit encryption, there is a clear analogy of the encryption to the combination lock where instead of physical wheel and spindle we have series of 0s and 1s placed in specific combination following certain random algorithm which can be deciphered only by specific sequence of key(s) and receiver(s). Also, we should understand the power of the bit combination which could not be very intimidating at first glance as it’s just a combination of merely two numbers (0 and 1) instead of fancy mathematical constants. The power of the encryption comes from the number of operations required to guess possible variation of the key, with is 2 exp n where n is the length of the key. Just to give an example 2 exp 10 means 1024 tries and that’s tries required by 10-bit key, in real-world we deploy north of 128-bit encryption which is 2 exp 128 1.8 followed by 55 zeroes number of tries. By this, we could clearly see the power of the bit when combined in mere 128 combinations.

Now if we reverse the analogy where we want to increase the security of dial combination the more the number of wheels we have lesser is the chance of a random guess and we can theoretically take this to level where It’s not feasible for anybody in the world(even a computer!) to crack the safe.


Related Solutions

**java** A bicycle combination lock has four rings with numbers 0 through 9. Given the actual...
**java** A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, print instructions to unlock the lock using the minimum number of twists. A “twist up” increases the number value of a ring, and a “twist down” decreases it. For example, if the actual number shown is 1729 and the desired combination is 5714, write your instructions like this: Ring 1: Twist up 4 times Ring 3: Twist down...
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA...
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA algorithm.
(Elgamal encryption): given elgamal encryption ciphersystem: a)show how can we create a new legal encryption from...
(Elgamal encryption): given elgamal encryption ciphersystem: a)show how can we create a new legal encryption from two different encryptions that we don't know their decryptions b)how can an adversary take advantage of the scheme at a) (what's written above), in order to attack a preknown encrypted text? elaborate
Two numbers x and y that are not machine numbers are read into a 32-bit word-length...
Two numbers x and y that are not machine numbers are read into a 32-bit word-length computer. The machine computes to xy2. what sort of relative error can be expected? Assume no underflow or overflow
Given an array A[1..n] of integers - all of whose numbers are in the range [0,...
Given an array A[1..n] of integers - all of whose numbers are in the range [0, n^3 − 1] give an algorithm which sorts them in O(n) time.
A roulette wheel has numbers from 1 to 36 and two "special" numbers 0 and 00....
A roulette wheel has numbers from 1 to 36 and two "special" numbers 0 and 00. A $1 bet on a number will pay $36 if that number comes up. It is also possible to bet on two adjacent numbers, with a $18 payout if one of them spells, or four adjacent numbers, with a $9 payout. a) Let X be the total payout of a $1 bet on a number. Find E(X) and Var(X). b) Let Y be the...
The Lucas numbers are very similar to the Fibonacci numbers and are defined by a1=2, a2=1,...
The Lucas numbers are very similar to the Fibonacci numbers and are defined by a1=2, a2=1, and an+2=an+1+an. So the first five are 2, 1, 3, 4, 7 and it continues in that fashion. Give the next 4 Lucas numbers
1. Prove that given n + 1 natural numbers, there are always two of them such...
1. Prove that given n + 1 natural numbers, there are always two of them such that their difference is a multiple of n. 2. Prove that there is a natural number composed with the digits 0 and 5 and divisible by 2018. both questions can be solved using pigeonhole principle.
(i) Design an 8-bit ripple adder which can add together two 8-bit numbers, inside a hierarchical...
(i) Design an 8-bit ripple adder which can add together two 8-bit numbers, inside a hierarchical block. Explain your design. Name your block with your student number: eg “123456 ripple adder”. (ii) Test your circuit in block form, showing four example additions with manual calculations to show they are correct. [
Determine if ~w = (−4, 6, 1) is a linear combination of ~u = (1, 0,...
Determine if ~w = (−4, 6, 1) is a linear combination of ~u = (1, 0, −1) and ~v = (1, −11, 3) . If so, then express ~w as a linear combination of ~u and ~v . Let ~u = (1, 1, −1) and ~v = (2, 1, 3). Determine if ~w = (7, 6, 3) is a linear combination of ~u and ~v. If so, express ~w as a linear combination of ~u and ~v. Let ~x1 =...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT