Question

In: Physics

Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...

Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left.

a.What is the key? (The Key is 5A)

b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have to reverse the order and direction of operations in order to decrypt the name (i.e. Start by rotating 2 positions right). What is name (as it appears exactly in the message)?

c. The answer to Part b is the name of a moon. Find (and give in upper case) the name of planet which has Part (b) as a moon. Using the key and the above algorithm, encrypt the name of this planet (in upper case) and give your result in hex format (not ASCII).

Solutions

Expert Solution


Related Solutions

Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left. a. The key is 5A b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have to reverse the...
You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and...
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.
Now, let’s look at the effect of difference in MPC. Fill out the following table (your...
Now, let’s look at the effect of difference in MPC. Fill out the following table (your answer for all Italians should come from question 1) Effect of Difference in MPC Marginal propensity to consume Multiplier on government spending All Italians .52 2.08 Group 1 .3 1.43 Group 2 .65 2.86 Discuss the differences in multipliers. In words (not math!), how does the MPC relate to the multiplier? Group 1 and Group 2 are two mutually exclusive collections of people in...
Now let’s assume the mandate to purchase insurance has been repealed, and determine if Bill, a...
Now let’s assume the mandate to purchase insurance has been repealed, and determine if Bill, a high risk person, will continue to buy insurance. Bill’s income when not sick is $50k, but when sick it’s $30k (since if uninsured he would have to spend $20k on health care). If his utility function is u = u(INC) = INC1/2 (i.e., the square root of the amount of income left to spend after health care), and if the probability of Bill being...
1.         Let’s look at Canada.  Assume an equilibrium where Aggregate Expenditure is $1,350 billion and Real GDP in...
1.         Let’s look at Canada.  Assume an equilibrium where Aggregate Expenditure is $1,350 billion and Real GDP in $1,350 billion.  (a)  If Real GDP grew to 1,600, but AE only grew to 1,550 what is the marginal propensity to consume?  0.8 (b)  From the initial state of $1,350, what change in taxes (positive or negative and actual numeric value) would bring GDP to $1,200 billion?  
Let’s continue to use the Toluca.txt dataset. We now assume a normal error model: Yi =...
Let’s continue to use the Toluca.txt dataset. We now assume a normal error model: Yi = β0 + β1xi + i (i = 1, . . . , n), i ∼ N (0, σ2 ), where xi = lotSize and Yi = workHrs. a. Obtain an estimate for σ 2 . Let’s call this estimator ˆσ 2 . You can either calculate this using the formula directly or obtain this from the R output using lm. b. Construct a 90%...
Now that you have a general idea about the banking system and Federal Reserve, let’s apply...
Now that you have a general idea about the banking system and Federal Reserve, let’s apply this information to your own financial performance. Your journal topic this week: Discuss your banking experiences. What has been challenging when it comes to banking? Is it surprising? Does your bank offer additional services, such as online banking, financial planning, or budgeting tools? Explain. Your journal entry must be at least 200 words in length. No references or citations are necessary.
1.Let’s assume that market is inefficient. They why don’t more people beat the market? 2.Show how...
1.Let’s assume that market is inefficient. They why don’t more people beat the market? 2.Show how efficient markets is the child of free-market thought. 3..Explain what is meant by rational irrationality and explain an example that is not directly related to finance. 4.Why does an efficient market imply a normal distribution in stock returns? 5. Let’s play the following game: Guess a number from 0 to 100 with the goal of making your guess as close as possible to two-thirds...
: Which set of Cash Flows is worth more now? Assume that your grandmother wants to...
: Which set of Cash Flows is worth more now? Assume that your grandmother wants to give you generous gift. She wants you to choose which one of the following sets of cash flows you would like to receive: Option A: Receive a one-time gift of $ 10,000 today. Option B: Receive a $1400 gift each year for the next 10 years. The first $1400 would be received 1 year from today.     Option C: Receive a one-time gift of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT