Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Decipher the message yitjpg using the Hill Cipher with the inverse key take the indices of letters according to the given table. Diffic

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
  2. A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.
  3. According to DAD triad, ___________ attempts to defeat availability.
  4. According to the internal structure, word combinations with head element are
  5. Answer the following questions using your own words but taking into account the
  6. C) Interview your partner using the questions in
  7. Choose a verb from the list and complete the text using Past Continuous or the Past Simple.

52. In an RSA system, the public key of a given user is e = 31, n = 3599. What is the φ(n)? 3480

53. Which of the statement(s) is(are) properties for p and q?

A. p and q are distinct

B. p and q are prime

C. p and q should be of similar bit length

D. p is greater than q

E. p = q -1

 

54. Which one of the statement is a formula to find cipher in RSA?

A. <i>c</i> = <i>m<i/> <sup>e</sup> (mod <i>n</i>).

B. <i>c</i> = <i>m<i/> <sup>d</sup> (mod <i>n</i>).

C. <i>c</i> = <i>m<i/> <sup>n</sup> (mod <i>e</i>).

D. <i>c</i> = <i>m<i/> <sup>n</sup> (mod <i>d</i>).

E. <i>c</i> = <i>m<i/> <sup>e</sup> (mod <i>d</i>).

 

55. Which one of the statement is a formula to find plain in RSA?

A. <i>m</i> = <i>c<i/> <sup>e</sup> (mod <i>n</i>).

B. <i>m</i> = <i>c<i/> <sup>d</sup> (mod <i>n</i>).

C. <i>m</i> = <i>c<i/> <sup>n</sup> (mod <i>e</i>).

D. <i>m</i> = <i>c<i/> <sup>n</sup> (mod <i>d</i>).

E. <i>m</i> = <i>c<i/> <sup>e</sup> (mod <i>d</i>).

 

56. Which one of the statement is equation for φ(n)?

A. φ(n) = (p)(q – 1)

B. φ(n) = (p – 1)(q)

C. φ(n) = (p – q)(q – 1)

D. φ(n) = (p – 1)(q – 1)

E. φ(n) = pq

 

57. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the value of p and q?

A. p = 6, q = 8

B. p = 1, q = 35

C. p = q = n = 35

D. p = 5, q = 7

E. p = q = e = 5

 

58. In an RSA system, the public key of a given user is e = 31, n = 3599. What is the value of p and q?

A. p = 61, q = 59

B. p = 62, q = 60

C. p = 1, q = 3599

D. p = q = n = 3599

E. p = q = e = 31

 


Дата добавления: 2015-08-18; просмотров: 112 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
The process of verifying and identity claimed by or for a system entity.| A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.

mybiblioteka.su - 2015-2024 год. (0.007 сек.)