Let’s say you have the ciphertext for the given
plaintext.
Plaintext:
it was disclosed yesterday that several informal but
direct contacts have been
made with political representatives of the viet cong in
Moscow
Ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZVUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSXEPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
Can you determine the cipher used? If yes, name the
cipher. Explain why.
Can you determine all/part of the key. If yes, give the
key or part of the key.
Explain how you deduced it.
Given the prime factors p and q, the encryption exponent e,
and the ciphertext C, apply the RSA algorithm to find (a) the
decryption exponent d and (b) the plaintext message M.
p
q
e
C
17
5
19
65
I have to get d and M
What is the network address if given this IP address and the
following subnet mask? Please note that the network may
be different if the subnet mask is different.
IP address 178.47.188.176
How many network bits if the following subnet masks?
255.254.0.0
255.255.252.0
255.255.255.248
4. 255.128.0.0
Write a Java program for RSA encryption that has the following
inputs and outputs: Given a message and an integer n = pq where p
and q are odd primes and an integer e > 1 relatively prime to (p
− 1)(q − 1), encrypt the message using the RSA cryptosystem with
key (n, e).
Methods – Compute Grade
Please write a complete Java program, given the following
information about (a few lines of code in) main: projectAverage =
getAverage(”Project”); // returns average of 2 grades testAverage =
getAverage(”Test”); // returns average of 2 grades
displayGrade(projectAverage, testAverage); // test are 70% &
projects 30%
Please answer the following questions
a) What is Encryption in accounting information system
and what are the steps in the encryption and decryption
process?
b) What are the factors that influnces encryption
strength?
c) What types of encryption systems and the advantages
and disadvantages , risks and their primay uses in information
systems?
d) How does hashing, digital signatures, and virtual
private networks process in encryption?
Given the following code for AES Electronic Code Block
implementation for the encryption functionality. Modify the code to
create a function named ‘encryptECB(key, secret_message)’ that
accepts key and secret_message and returns a ciphertext.
#Electronic Code
Block AES algorithm, Encryption Implementation
from base64 import b64encode
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad
from Crypto.Random import get_random_bytes
secret_message = b" Please send me the fake passport..."
password = input ("Enter password to encrypt your message: ")
key= pad(password.encode(), 16)
cipher...