Question

In: Computer Science

5. On the web view each of the following web sites. Write a short summary of...

5. On the web view each of the following web sites. Write a short summary of your understanding of each.

rumkin.com program to test several types of coding. Rate each one on strength.

https://youtu.be/SAAflrIp__E

https://youtu.be/-yFZGF8FHSg

https://youtu.be/uK8DXrTEK-U

BY SEEING THE YOUTUBE LINK VIDEOS WRITE A SHORT SUMMARY OF YOUR UNDERSTANDING FOR ALL THOSE 3 LINKS

Solutions

Expert Solution

1) Cryptography and power of randomness:

This video tries to explain the what cryptography is in layman terms. Encrytion is not actually new. It was used as old as 1 BC, but it was weak. During ceaser cipher it was just a simple transposition. Hence, it was easily breakable. So, the mordern machines have to be stronger and better. The basic concept is it should be easy to create but hard todestroy, just like the prime factorization. If the factors are known, we can easily multipy them to find the product but factorizing the prodiuct is difficult. Though there are random number genrators , they are not actually random, they follow some pattern. We should understand that cryptography is the basic pillar of security and privacy.

2) Science of making and breaking codes:

The important things of interest are the cipher and key. If key is know we can decipher the text. One, should always remember that nothing is practically unbreakable, when given time and resources we can break it. One should understand that there are certain patterns that exist which make the algorithm weak and using which one can crack into it. Generally, it is considered that the longer the cipher is the easier it is to break it because, we get to see more patterns. There, are 2 basic types of classifications, mono alphabetic where each letter is substituted by exactly only one letter and poly alphabetic where it can be replaced by many letter, though better than mono it's still not fail proof. The enigma machine is a classic exampe of this. So, there is better alterantive known as the one time pad encryption where key is destroyed after the first use, but practically it is difficult to do this always. It should also be noted that when billions of operations can be performed in seconds. Even Brute force becomes a likely possibilty.

3) CIA'S Unsolved Secret Code:

The two basic concepts of cryptogrphy are covered here, namely transposition and substitution. Though these are very basic and adding and mutiplying one with other creates enough complexity to the given problem. It should be noted that the difficulty is only for the person who is not intended to listen to it. The intended parties can always easily understand it because they have already agreed upon a mutual key. In english it should be noted that in almost any text there are certain pattterns on the frequencies of the letters. So, anything can be broken if complete information is available to us in the plain sight. So, here another important concept explained is the concept of concealment, even if very tiny part of the entire information is concealed the problem becomes exponentially difficult.


Related Solutions

Write the XHTML code for a short Web page. Include the following along with the usual...
Write the XHTML code for a short Web page. Include the following along with the usual HTML and BODY tags. You can use whatever hyperlinks and image URLs you want. (other than distasteful sites, that is!) A title Email link A graphic (gif or jpg) Hyperlink(s) to other sites. Heading A list (can be unnumbered, numbered, etc…) A background color or a background image. please do not copy the previous answer.
Write the XHTML code for a short Web page. Include the following along with the usual...
Write the XHTML code for a short Web page. Include the following along with the usual HTML and BODY tags. You can use whatever hyperlinks and image URLs you want. (other than distasteful sites, that is!) A title Email link A graphic (gif or jpg) Hyperlink(s) to other sites. Heading A list (can be unnumbered, numbered, etc...) A background color or a background image.
To be done in Python 3.7 Some Web sites impose certain rules for passwords. Write a...
To be done in Python 3.7 Some Web sites impose certain rules for passwords. Write a function that checks whether a string is a valid password. Suppose the password rules are as follows: A password must have at least eight characters. A password must consist of only letters and digits. A password must contain at least two digits. Write a program that prompts the user to enter a password and displays valid password if the rules are followed or invalid...
ASSIGNMENTS 1. POSTING (5 pts) Visit the following web site to view some fractures from the...
ASSIGNMENTS 1. POSTING (5 pts) Visit the following web site to view some fractures from the outside and also through x-ray: http://www.surviveoutdoors.com/emergency/fractures.asp Post a message describing what you thought of the web site in the message center:
Write a paragraph conducting an online analysis of advertising used on various web sites. Analyze how...
Write a paragraph conducting an online analysis of advertising used on various web sites. Analyze how these promotions are used to attract viewers to the site, to generate advertising revenue, to motivate online buying, or for other promotional goals.
Web crawlers need to estimate the frequency of changes to Web sites to maintain a current...
Web crawlers need to estimate the frequency of changes to Web sites to maintain a current index for Web searches. Assume that the changes to a Web site follow a Poisson process with a mean of 3.5 days. a) (6 pts) What is the probability that the next change occurs in less than 2.0 days? b) (6 pts) What is the probability that the time until the next change is greater 7.0 days? c) (6 pts) What is the time...
Post to the following topic. Your post must include the web sites of the research used...
Post to the following topic. Your post must include the web sites of the research used in your discussion. Your post should be at least one well-developed page (300-350 words). Is college worth the cost? Cite your resources.
What are three of your favorite Web 2.0 technologies or Web sites? Explain what is so...
What are three of your favorite Web 2.0 technologies or Web sites? Explain what is so great about each of them and how they might be improved. (Dont copy previous answers)
Access the Lowe's Web site and download the 2011 annual report. Write a brief summary of...
Access the Lowe's Web site and download the 2011 annual report. Write a brief summary of the basic operations and the performance of the firm indicated in this report. Discuss what you think would be useful metrics and rationale for the firm to plan for a significant expansion in terms of their number of stores.
1.Search the Web for a project that was completed successfully. Write a 100-200 word summary of...
1.Search the Web for a project that was completed successfully. Write a 100-200 word summary of the project, including the critical factors that made this project a success. 2.Search the Web for a project that was not completed successfully. Write a 100-200 word summary of the project, including the reasons why you think this project failed.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT