Cryptography and Data Protection A - a sleeper behind enemy lines found this message. It is believed that it uses straight letter substitution. Decrypt this message. y txoffo qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx. y txoffo of qxxofyqnco to tho fxqf of tho qnytof ttqtos of qmotycq qnf to tho totqbxyc fot zhych yt stqnfs, ono nqtyon qnfot fof, ynfyvysybxo, zyth xybotty qnf jqstyco fot qxx. Note: It is a straight letter substitution. However, depending on the case (upper or lower) there might be a different substitution. B - Diffie-Hellman Key Generation 1. Paul and Linda are far away and want using the D-H method, to come up with a secret number. 2. Their communications are public. 3. In a public communication they agreed to work with numbers, g=10 and p=17. 4. They parted Paul went to Paris and Linda went to Lasa. 5. Paul selects his private number to be 5. 6. Linda selects her private number to be 7. Determine the derived secret number. C - The following enemy message was intercepted. It must be relayed, but modified to mislead. The message is accompanied by a "signature" made of the indicated letters. Which is BTATP. Create a misleading message that produces the same "signature". 123456789101112131415161718192021222324BRINGTHEWEAPONSTOAIRPORTB T A T P D - An encryption algorithm works as follows: 1. It takes a numerical message and cuts it down to ten digit words. 2. The encrypted word has the same number of digits. 3. The first five digits of the encrypted word are the integral part of the square root (base 10) of the number represented by the word. 4. The last five digits of the encrypted word are the remainder the square root operation. B. Decrypt the following encrypted message A. Encrypt the following plain...
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here