0% found this document useful (0 votes)
104 views1 page

SOLUTION Question 1 - LL

aaresd

Uploaded by

ypyccypy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views1 page

SOLUTION Question 1 - LL

aaresd

Uploaded by

ypyccypy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Search for study resources 

Access over
20 million
homework & study
documents
Search study resources

HomeNotebank
Question 1

Question 1
Content type Subject

User Generated Cyber Security

Type Rating

Homework 

UNLOCK DOCUMENT

Showing Page: 1/5

ANSWERS 1

Student Name

Course

Instructor

Date

Sign up to view the full document!

 SS II GG NN U
UPP

Showing Page: 2/5

ANSWERS 2

Answers

Question 1) In ElGamal , given the prime p=31:

a) Choose an appropriate e1 and d, then calculate e2.

I choose e1=3 (a primitive root of p=31) and d=10

e2=310 mod 31=25

b) Encrypt the message "HELLO", use 00 to 25 for encoding. Use different blocks to make

Use the additive cipher with key = 15 to encrypt the message “hello”

Plaintext: h → 07 Encryption: (07 + 15) mod 26 Ciphertext: 22 → W

Plaintext: e → 04 Encryption: (04 + 15) mod 26 Ciphertext: 19 → T

Plaintext: l → 11 Encryption: (11 + 15) mod 26 Ciphertext: 00 → A

Plaintext: l → 11 Encryption: (11 + 15) mod 26 Ciphertext: 00 → A

Plaintext: o → 14 Encryption: (14 + 15) mod 26 Ciphertext: 03 → D

Therefore, the cipher text is “WTAAD”

c) Decrypt the ciphertext to obtain the plaintext.

Sign up to view the full document!


Using the additive cipher with key = 15 to decrypt the message “WTAAD”.

Ciphertext: W → 22 Decryption: (22 − 15) mod 26 Plaintext: 07 → h

 S
S−II15)G
Ciphertext: T → 19 Decryption: (19 Gmod
N
N 26U
U P
P 04 → e
Plaintext:

Ciphertext: A → 00 Decryption: (00 − 15) mod 26 Plaintext: 11 → l

Ciphertext: A → 00 Decryption: (00 − 15) mod 26 Plaintext: 11 → l

Ciphertext: D → 03 Decryption: (03 − 15) mod 26 Plaintext: 14 → o

Therefore, the plain text is “hello”

Showing Page: 3/5

Sign up to view the full document!

 SS II GG NN U
UPP

End of Preview - Want to read all 5


pages?

ACCESS NOW

UNFORMATTED ATTACHMENT
PREVIEW

ANSWERS 1 Student Name Course Instructor Date


ANSWERS Answers Question 1) In ElGamal , given
the prime p=31: a) Choose an appropriate e1 and
d, then calculate e2. I choose e1=3 (a
primitive root of p=31) and d=10 e2=310 mod
31=25 b) Encrypt the message "HELLO", use 00 to
25 for encoding. Use different blocks to make

Tags: Decrypt the Ciphertext public and private keys

Create cipher text equation of curve Elliptic curve

User generated content is uploaded by users for the


purposes of learning and should be used following
Studypool's honor code & terms of service.

Honor Code
Report DMCA
Review

Anonymous
Excellent resource! Really helped me get
the gist of things.


Studypool Trustpilot Sitejabber

4.7 4.5 4.4

24/7 Homework Help

Stuck on a homework question? Our verified


tutors can answer all questions, from
basic math to advanced rocket science
science!

POST QUESTION

Most Popular Study Documents

Mid Term

The midterm test is over chapters 1-5. Please use this


template and answer the questions on this form. Place
your name at ...

Cmit495 Sdn And Ibn Whitepaper

CMIT 495: Current Trends and Projects in Computer


Networks and Security How SDN/IBN Architecture is
Different from the Tra ...

Northern Virginia Community College Famous Per…

Business Intelligence User Adoption Plan

Planning, analysis and implementation of a business


intelligence strategy for any firm can be a challenging
task. In most ...

Help On SCR Case

Question:2. Need a testing plan that includes unit


integration and system testing as Jesse requested. Also,
need a reminde ...

Ntopicfour

Should the Government Regulate the Security and/or


Privacy Associated with the Use of IoT In light of a surge
in security ...

Similar Documents

American College of California R vs Python Discussi…

Discussion Question: Compare and contrast the use of


R vs Python and identify the pros and cons of each.
Provide an exampl...

Microsoft Access10, computer science homework h…

Complete the Assignment with any modifications


listed.Complete the Chapter 4, Practice Exercise 2,
"Comfort Insurance," on...

Texas Womens University Android Workshop Flyer

Create a 8.5x11" flyer using Photoshop or GIMP. No


other application is allowed. The topic of the flyer
should be related ...

Arizona State University Ecommerce Industry Comp…

Annotated BibliographyEach week, view the video


lectures under Learning Activities to learn about the
parts of the researc...

ITS 530 Campbellsville University Peyton Manning R…

Assignment – Editorial ExtractionSelect any


visualisation/infographic and looking at any individual
chart included. Tr...

PPDIOO Model and Implementation of Hub and Sp…

See attachment for instructions. - 200 words for each


subject - 2 Apa citations per subject No plagiarism ...

Business Case Project

The Moog Handheld Business Case has presumed that


the general net cost/advantage of a Handheld is
inadmissible and is fund...

Cyber Terrorism Incident.edited

In 2019 July, Capital One bank, one of the most


prominent financial institutions in the United States,
su!ered victim of ...

Cybersecurity Planning And Management

Workplaces are places that have rules and regulations


that are supposed to be obeyed. Some organizations
tend to prohibit ...

SUBJECTS WE COVER

Accounting Communications

Geology Physics

Algebra Computer Science

Health & Medical Political Science

Art & Design Economics

History Programming

Article Writing Engineering

Law Psychology

Biology Excel

Management Python

Business & Finance Environmental Science

Marketing SAT

Calculus Film

Mathematics Social Science

Chemistry Foreign Languages

Philosophy Sociology

Statistics Science

Website Design Java

How it works | Honor Code |

Terms of Service | Homework Help |

Documents | Become a Tutor | Tags |

DMCA Policy | Media & Press | Blog |

Our Mission

Copyright © 2023. Studypool Inc.

Studypool is not sponsored or endorsed by any college or


university.

You might also like