CSCI 351 Assignment 2 60 points Instruction: · Show your own work (

CSCI 351 Assignment 2

60 points

Instruction:

· Show your own work (at least 50% penalty otherwise)

· Submit
a single WORD document (*.doc or *docx only) containing all your answers to the assignment folder (“Assignment X”) under D2L (at least 10% penalty otherwise)

· Make sure you submit the intended one. It is recommended that you download what has been uploaded and double-check if the correct document has been submitted.

· You can submit as many times as you want, but the last submission will only be graded. If the last submission is made after the deadline, there will be a late submission penalty.

· No plagiarism: Do not copy and paste any from textbooks and other resources to answer questions (Zero points will be given otherwise).

· Turnitin file similarity should be less than 10%

· AI misuse or AI writing detection (

· Should be less than 10%

· No resubmission/extension request will be accepted.


Problem 1. Vernam (One-time pads) Cipher (60 pt., 20 pt. each)

a. Create a mapping table to represent all 26 uppercase letters (A-Z) using 5-bit binary codes. For instance, A and Z can be represented as 00000 and 11001, respectively. Table 1 is an example for your reference.

Letter

A

B

C

X

Y

Z

Binary

00000

11001

b. Based on the mapping table you created, we can encode and decode your own name in Vernam cipher. Firstly, construct a string using your name and take the first letters as your message. For instance, my name is “Jessica Wang”. The constructed string is “JESSICAWANG” and message is “JESSI”.

Find your name (USE THE NAME “Griselda Osornio”) and use the key “HELLO” for encryption. What is the ciphertext C? Show your steps.

c. With the ciphertext C that you got in Problem1.b, show your steps for decryption using the same key.

1

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Understanding Operating Systems (Zero-cost course material) Unit 5 Lab

Understanding Operating Systems (Zero-cost course material) Unit 5 Lab Assignment 5: Networking and Security (40 points) In this assignment, you will learn to check network configurations and services and to configure an IP address on a computer. For each of the two questions, do the following: 1. Create a document (use

Research – System Analysis and design Assignment 9.1 – Business Processes and Process Management Research a scholarly paper or

Research – System Analysis and design Assignment 9.1 – Business Processes and Process Management Research a scholarly paper or professional video on  “Business Processes, and Process Specifications”  and reflect on only one (1) of the following topics: · “Processes”: What type of business system’s Processes exist? · “Specifications”: How important

1. Prepare a professional cover letter Articulate effective interview strategies Explain the difference between a “good” interview and a “bad” interview

1. Prepare a professional cover letter Articulate effective interview strategies Explain the difference between a “good” interview and a “bad” interview Lecture notes There are 3 sections of a cover letter that are required when writing a professional cover letter to include with your resume: Introductory paragraph (to attract the

PROJECT DESCRIPTION The use of digital media has transformed how companies communicate with their customers. The use of the websites, YouTube, e-books, e-mail

PROJECT DESCRIPTION The use of digital media has transformed how companies communicate with their customers. The use of the websites, YouTube, e-books, e-mail and various forms of social media such as Facebook, Twitter, Pinterest, Snapchat, Instagram, and blogs has shaped current day communication strategies. Project 1 Consists of: 1. Project