Answer:
polygon_sides = {"Triangle" : 3,"Square" : 5}
n_polygons = {}
for key in polygon_sides:
n_polygons[polygon_sides[key]] = key
print("Polygon sides: ", polygon_sides)
print("Names of polygons: ", n_polygons)
Explanation:
- Initialize the polygon_sides dictionary.
- Loop through polygon_sides dictionary and assign the associated names to n_polygons variable.
- Display the polygon sides and the names of polygons.
The feature that can improve cybersecurity is the detection of interferences, and the one that can be used by hackers is checking the configuration of networks.
Netstumbler is a program used to identify surround wireless networks. This program is mainly available for Window systems and includes the following features:
- Detecting wireless networks.
- Detecting interferences.
- Checking the configuration of networks.
These features have both a positive and a negative side as they can be used to increase cybersecurity, which is positive, but they can also be used by hackers to attack networks and the devices in them.
One positive feature is the detection of interferences because this can be used to detect possible external or threatening networks. On the other hand, checking the configuration can be a negative feature because hackers can use this information to enter and hack the networks.
Learn more in: brainly.com/question/17021829
Answer:
Encryption method security:-
- Encryption method representing each alphabetic character as an integer between 0 and 25.
- Now, apply RSA algorithm for each integer is not an efficient secure encryption method.
Explanation:
- Let consider alphabetic characters set {A, B... Z} .
- Each alphabetic character forms a set of message block values M={0,1,2...,25).
- From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
- Then, compute the cipher text with knowledge of Bob's public key;
- If the public key is generated, then possibility to decrypt the cipher text to plain text.
- The generated public key is easily calculated by everyone and security is lost.
- Therefore, the encryption method is not secure.
Encryption method is not secure, Most efficient attack against this method:-
- Now, compute the encryption message with the function Me mod n for all the possible values of M.
- This is the most efficient attack against the scheme in encryption method.
- Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.