1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
4 years ago
14

Listed below is an example for encrypting text using a Cipher. Assumptions The letters in the alphabet correspond to their count

erparts in arithmetic notation mod 26. So the letters of the alphabet A-Z are represented by the numbers 0-25 respectively. S A M P L E is initially coded as 18 0 12 15 11 4 Next a random stream of numbers is combined with the letter codes: 76 48 03 83 44 16 Encoding the message: 18 00 12 15 11 04 76 48 03 83 44 16 Add 94 48 15 98 55 20 Sum 16 22 15 20 03 20 Mod 26 Now convert into cipher text: Q W P U D U Given the set of random numbers below, convert the word S E C R E C Y into cipher text: Random number stream 18 10 88 65 40 22 25
Computers and Technology
1 answer:
jekas [21]4 years ago
4 0

Answer:

See the explanation section

Explanation:

The general representation of alphabet encoding is given as:

A = 0, B = 1, C = 2, D = 3, E = 4, F = 5, G = 6, H = 7, I = 8, J = 9, K = 10, L = 11,

M = 12, N = 13, O = 14, P = 15, Q = 16, R = 17, S = 18, T = 19, U = 20, V = 21,

W = 22, X = 23, Y = 24, Z = 25.

Based on the sample:

Cipher = E(p, k) = (p + k) mod 26

We want to encrypt SECRECY:

Using a key of 18 10 88 65 40 22 25

S = (18 + 18) mod 26 = 36 mod 26 = 10 =K

E = (4 + 10) mod 26 = 14 mod 26 = 14 = O

C = (2 + 88) mod 26 = 90 mod 26 = 12 = M

R = (17 + 65) mod 26 = 82 mod 26 = 4 = E

E = (4 + 40) mod 26 = 44 mod 26 = 18 = S

C = (2 + 22) mod 26 = 24 mod 26 = 24 = Y

Y = (24 + 25) mod 26 = 49 mod 26 = 23 = X

Therefore, the cipher will be written as: KOMESYX.

Note: p = plaintext and k = key.

You might be interested in
The standard toolbar appears whenever you select text.
Irina-Kira [14]
If you are asking true or false, it  is true.
3 0
4 years ago
CHALLENGE ACTIVITY
julia-pushkina [17]

Answer:

avg_owls=0.0

num_owls_zooA = int(input())

num_owls_zooB = int(input())

num_owls_zooC = int(input())

num_zoos = 3

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print('Average owls per zoo:', int(avg_owls))

Explanation:

There is a problem while you are trying the calculate the average owls per zoo.

As you may know, in order to calculate the average, you need to get the total number of owls in all the zoos, then divide it to the number of zoos. That is why you need to sum num_owls_zooA + num_owls_zooB + num_owls_zooC and divide the result by num_zoos

Be aware that the average is printed as integer value. That is why you need to cast the avg_owls to an int as int(avg_owls)

6 0
3 years ago
How do you report someone on Brainly?
morpeh [17]

Answer:

dont think u can actually report someone, pero u can report their questions/answers by clicking on the little flag icon and selecting why u want to report them. if they get reported enough they can be banned for about a day or so,, or they could get permanently banned

Explanation:

4 0
4 years ago
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing the
zvonat [6]

Answer:

wireless LAN

Explanation:

An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.

3 0
4 years ago
Graphics that contain movement are often referred to as<br>..........​
Jlenok [28]

Answer:

I think the answer is animation.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which option is a form of an assistive technology?
    7·1 answer
  • Speech on inventors and inventions
    14·1 answer
  • Consider the unsigned decimal number 35. What is the value in hexadecimal?<br><br> 1. 3510 = ____ 16
    13·1 answer
  • A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error.
    10·1 answer
  • An array of Strings, names, has been declared and initialized. Write the statements needed to determine whether any of the array
    9·1 answer
  • What does CRM stand for?
    10·1 answer
  • Wassup anybody tryna play 2k
    6·2 answers
  • Write convert() method to cast double to int Complete the convert() method that casts the parameter from a double to an integer
    12·1 answer
  • You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a descripti
    15·1 answer
  • What is the scope of AS-26
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!