Please complete the following problems, being sure to explain your conclusions or show your work when such details are requested. Your solutions must be submitted to Canvas as a PDF file.
This assignment is to be completed individually – plagiarism and cheating are strictly prohibited and are punishable.
- Complete Problem 10 (a, b) from the text. The German Enigma is…
- Consider the definitions of confidentiality, integrity, and availability.
- When might each of these aspects of information security be more important than the others?
- Describe a few situations where strengthening one of these might weaken another.
- Complete Problem 8 (a, b, c, d) from the text. This problem deals with the concepts of confusion…
- Complete Problem 19 (a, b) from the text. Using the letter encodings in Table 2.1, the following…
- Complete Problem 29 (a, b, c, d) from the text. Suppose that Alice encrypted a message with a…
- Suppose a cipher uses a 10-character mixed-case alphanumeric key (0-9, a-z, A-Z).
- What is the size of the keyspace (i.e., how many unique keys are possible)?
- What is the approximate strength of the key, measured in bits? Hint: rewrite the size of the keyspace as a power of two.
- If a particular computer can test 240 keys per second, how long will it take (on average) to guess the key of this cipher?