1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
12

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per se

cond. How long in (days or years) would it take for you to find the key to a code that used a 112-­‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-­‐‑bit-­‐‑key.)
Computers and Technology
1 answer:
Len [333]3 years ago
4 0

Answer:

Following are the solution to this question:

Explanation:

In point 1:

Trials frequency = \frac{100 \  million }{second}

calculating the main length of cryptography = 112 bit

\to 100\  Million = 1 \times 10^8

calculating the second year value:

\to 365 \times 24 \times 60 \times 60 =3153600\\\\

                                  =3.15 \times 10^7 \ seconds

Currently, in average , at least half the possible sleeves is being used to verify the encryption process:  2^{111} \ keys

\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years

the total time value will be 8.22 \times 10^{20} \ years

In point 2:

In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).  

Algorithm:-

The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::  

ciphertext = EK3(DK2(EK1(plaintext)))

I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.  

The reverse is the decryption:  

plaintext = DK1(EK2(DK3(ciphertext)))

I.e. decrypt by K3, crypt by K2, decrypt by K1.  

Every three-bit authentication encrypts a 64-bit block.

Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.

You might be interested in
Wilt short answer of the fol<br>What is an operating systeme te ay maglia<br>​
Mamont248 [21]

Answer:

well it game

Explanation:

its gamw because you have to be smart with word njbhjvkgv

6 0
3 years ago
Which of the following statements is false? Question 4 options: By convention class names begin with an uppercase letter, and me
amm1812

Answer:

Instance variables can be declared anywhere inside a class.

Although there isn't any rule to declare instance variables before methods, and they can be declared anywhere in the class, they cannot be declared inside method definitions of class.

///////////////////////////////////////////////////////////////////////////////////////////////////////////

<em>By convention class names begin with an uppercase letter, and method and variable names begin with a lowercase letter.</em> - True.

<em>Instance variables exist before methods are called on an object, while the methods are executing and after the methods complete execution.</em> - True.

<em>A class normally contains one or more methods that manipulate the instance variables that belong to particular objects of the class.</em> - True

8 0
3 years ago
Read 2 more answers
In 3–5 sentences, describe how good e-mail work habits increase workplace efficiency and productivity.
Ket [755]
Faster communication, information spread faster, group messages
6 0
3 years ago
What is the amount of money you still owe to their credit card company called?
murzikaleks [220]
The money you owe is called a debt or a fee you owe them
3 0
3 years ago
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling d
Gnom [1K]

Computer engineering

3 0
3 years ago
Other questions:
  • When using the “reply all” option, your message will automatically be sent to ____ recipients of the original message. ​?
    7·2 answers
  • Which of the following is a key component to your individual internet safety? government regulations
    13·1 answer
  • The ____ allows a core to communicate with other cpu components, such as the memory controller and other cores
    14·1 answer
  • What will be the value of ans after the following code has been executed?
    10·2 answers
  • A videogame designer would be most interested in the _____ elements of beowulf.
    12·2 answers
  • Which statement accurately compares the restart at 1 and continue numbering featured of word
    15·2 answers
  • How often does colleges update the cost of attendance on their website?.
    13·1 answer
  • Suppose you are given a bag containing n unbiased coins. You are told that n − 1 of these coins are normal, with heads on one si
    7·1 answer
  • Write a program that takes paragraph from the user and prints all unique words in that paragraph using strings in c++
    5·1 answer
  • HELP GENIUS Rank :))) DoNT answer If you don't know
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!