Cyptology and data protection

CRYPTOLOGY AND DATA PROTECTION 1
Cryptology and Data Protection
Name
Institutional Affiliation
CRYPTOLOGY AND DATA PROTECTION 2
Cryptology and Data Protection
Question 1a
A
B
C=A or B
D= A xor B
E= A and B
F
F
F
F
F
F
T
T
T
T
T
T
T
F
T
T
F
T
T
F
Question 1b
The operation Θ denotes xor
Therefore, the operation that yields 
  is given by

 ; 
Therefore, the operation used based on the comparisons on the truth table xor.
Question 2
The encryption function is given by
 where {p
1,
p
2,
p
n}
represents the plain text while the cipher text is
represented by {c
1,
c
2,
c
n}.
EWEM SC K QBOKD CMRYYV
E
W
M
S
C
K
Q
B
O
K
D
C
M
R
Y
Y
V
CRYPTOLOGY AND DATA PROTECTION 3
C
1
C
2
C
4
C
5
C
6
C
7
C
8
C
9
C
10
C
11
C
12
C
13
C
14
C
15
C
16
C
17
C
18
P
1
P
2
P
4
P
5
P
6
P
7
P
8
P
9
P
10
P
11
P
12
P
13
P
14
P
15
V6
P
17
P
18
Function for decryption is



P
i
is the plain text
C
i
is the ciphertext message, and 10 is the decryption key.
Calculations


  


=21 represented by U
The value of c
2
=W
 





Therefore,
  






 


CRYPTOLOGY AND DATA PROTECTION 4



 






  






 





 







  









 




CRYPTOLOGY AND DATA PROTECTION 5




 








  








  








 








 








 







CRYPTOLOGY AND DATA PROTECTION 6

 








 




Replacing the values in the original table;
E
W
M
S
C
K
Q
B
O
K
D
C
M
R
Y
Y
V
C
1
C
2
C
4
C
5
C
6
C
7
C
8
C
9
C
10
C
11
C
12
C
13
C
14
C
15
C
16
C
17
C
18
U
M
C
I
S
A
G
R
E
A
T
S
C
H
O
O
L
The plain text, therefore, becomes UMUC IS A GREAT SCHOOL
Monoalphabetic shift/ Caesar cipher
Question 3
The formula used;
mod( X^n, p) = mod (mod(X,p)*mod(X^n-1, p), p)
mod(X*Y,p) = mod(mod(X,p)*mod(Y,p),p)
Alice’s Text
T
A
is given by g
SA
mod p


904
T
A

CRYPTOLOGY AND DATA PROTECTION 7






S
A
=911
Calculation for Bob’s secret key S
B
T
A
=528
T
B
=839
S
A
=S
B


911=904^S
B
mod 1013
Adding numbers from 2 to n S
A
and putting in the equation we get S
B
Therefore, adding up to 23 gives S
B
Since 911=904^23 mod 1013
S
B
=23
Question 4
The hash value H = (VChar 1 x VChar 2 x VChar 3 …x VChar N) mod (26).
According to "Cryptography Hash functions," 2018, A hash function is a function in
mathematics that a numerical value (input) into a different compressed numerical value.”
Hash function properties
Pre image resistance
CRYPTOLOGY AND DATA PROTECTION 8
Collision resistance
Second pre image resistance
G
L
A
R
E
7
12
1
18
5


 
Alice could have used SECRET to spoof Bob’s message.
S
E
C
R
E
T
19
5
3
18
5
20
Hash SECRET mod 26=19*5*3*18*5*20 mod 26=20
Question 5
a. The entropy is zero. Entropy is the measure of a message’s unpredictability. In
this case, the message was received unencrypted successfully; predictable.
b. It is impossible to predict the entropy of the encrypted message. To know the
entropy, missing information or errors in the text is required and cannot be seen
without decryption. Decryption has to be done to determine the entropy of the
message.
CRYPTOLOGY AND DATA PROTECTION 9
References
Cryptography Hash functions. (2018). www.tutorialspoint.com. Retrieved 3 April 2018, from
https://www.tutorialspoint.com/cryptography/cryptography_hash_functions.htm

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.