## Description

Please complete the following problems, being sure to explain your conclusions or show your work when such details are requested. Your solutions must be submitted to Canvas as a PDF file.

This assignment is to be completed individually â€“ plagiarism and cheating are strictly prohibited and are punishable.

Chapter 1:

- Complete Problem 10 (a, b) from the text.
*The German Enigma is…* - Consider the definitions of confidentiality, integrity, and availability.
- When might each of these aspects of information security be more important than the others?
- Describe a few situations where strengthening one of these might weaken another.

Chapter 2:

- Complete Problem 8 (a, b, c, d) from the text.
*This problem deals with the concepts of confusion…* - Complete Problem 19 (a, b) from the text.
*Using the letter encodings in Table 2.1, the following…* - Complete Problem 29 (a, b, c, d) from the text.
*Suppose that Alice encrypted a message with a…* - Suppose a cipher uses a 10-character mixed-case alphanumeric key (0-9, a-z, A-Z).
- What is the size of the keyspace (i.e., how many unique keys are possible)?
- What is the approximate strength of the key, measured in bits?
*Hint: rewrite the size of the keyspace as a power of two.* - If a particular computer can test 2
^{40 }keys per second, how long will it take (on average) to guess the key of this cipher?