1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
4 years ago
15

2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho

ice. You can use an internet solver to encrypt your string as well. List your original, text string and the encrypted version of it. Briefly describe why this encryption technique is better than the simple shift cipher you used in question 1. What makes the encryption stronger or harder to crack? Briefly describe how your chosen encryption technique work?

Computers and Technology
1 answer:
Kruka [31]4 years ago
8 0

Answer:

There are two better techniques for encryption as compared to shift cipher. One is block cipher. Such techniques use one key for both encryption and decryption. For example Advanced Encryption Standard (AES). This is based on symmetric key encryption.

The other way is to use asymmetric key encryption technique which based on two keys i.e. public and private key for encryption and decryption. For example, Rivest-Shamir-Adleman (RSA).

Explanation:

What is AES?

Advanced Encryption Standard (AES) is a symmetric key block cipher  which uses 128, 192 or 256-bit keys  length to encrypt and decrypt a block of plain text or message. It is stronger and faster than Shift Cipher encryption technique. It can encrypt data blocks of 128 bit using the above mentioned bit key lengths. The greater then key length the greater the security. the number of rounds in AES is variable and depends on the length of the key. The length of these keys determines the number of rounds for example 128 bit keys has 10 rounds, 12 rounds for 192 bit keys and 14 rounds for 256 bit keys. Each rounds involves some processing. This process is explained below:

How AES works?

The data is divided into each of size 128 bits makes a matrix of 4x4 columns of 16 bytes. (bytes because AES takes 128 bit plain text block as 16 bytes)

Substitution: First the data is substituted using a fixed substitution table which is predetermined. This makes a matrix of rows and columns.

Shifting: Each rows of the matrix is shifted to the left and the dropped entries in row are inserted on the right. Shift is carried out as follows −  

Mixing columns: Use a mathematical method/equation to transform the columns where the input of the method is each column of data which is then replaced by this function into a different new matrix of data(bytes). This is basically the first round to transform plain text to cipher text. Now consider these bytes as 128 bits, the first round key is added to these resultant column bits by XOR. A separate portion of the encryption key length is used to perform the transformation on each column. The number of rounds depend on the the key length.

After the first round key comes the second round key and so on and when the last round key is added then this whole process goes back to Substitution phase, then shifting rows phase, then mixing columns and another round key is added after this. For example, if 128 bit key is used this means there will be nine such rounds.

Advantages

AES supports large key sizes which makes it more secure and stronger than shift cipher encryption techniques which can be cracked because of their small key space. If someone wants to decrypt a message and knows it's encrypted by a Shift Cipher technique then the key space of all possible keys is only the size of the alphabet. This is a very small scale.  An attack such brute force attack attempting all 26 keys or even using exhaustive technique will easily crack this. So AES having large key size is more robust against cracking. For example in AES in order to crack an encryption for 128 bit around 2128 attempts are needed. Also for a 256 bit key, 2256 different combinations attempts are needed to ensure the right one is included which makes it harder to crack and makes is more secure.

I have used an internet solver to encrypt a string and i am attaching the result of the encryption. The plain text is: Two One Nine Two

The key is Thats my Kung Fu

and the cipher text in hexadecimal after using AES is:

29 c3 50 5f 57 14 20 f6 40 22 99 b3 1a 02 d7 3a

You might be interested in
I need solutions to below questions with python code:
Vitek1552 [10]

Answer:

1) my_family.py

family = ('Dad', 'Mom', 'Agnes', 'David', 'Chris', 'Millie')

for name in range(len(family)):

   print(family[name])

2) work_list.py

my_number = [2, 6, 3, 1, 8, 4]

# add items at the end of the list.

my_number.append(0)

my_number.append(5)

# sorts the list, default - ascending.

my_number.sort()

size = 0

while size < len(my_number):

   print(my_number[size])

   size += 1

Explanation:

The tuple and list data structures are ordered, using indexes to locate items in its container.

The family.py file uses the for-loop to iterate and print the family names in the tuple.

The work-list.py file contains a list of integers which is modified by adding items at the end of the list with the append method and a prints all the items using a while-loop.

5 0
3 years ago
What are 5 ways we can reduce our energy?
Burka [1]
1. Wear the right clothes

Dress for the temperature. Layering clothes and wearing wool helps keep you warm in winter, and means you can turn your heater down.

2. Shut doors and close curtains

Heating or cooling the whole house can be expensive. Where possible, shut doors to areas you are not using and only heat or cool the rooms you spend the most time in.

Make sure your curtains or blinds seal your windows properly, and keep your curtains closed at night, and during the day when there is a heat-wave. Block draughts around doors and windows to stop air leaking out, or in.

3. Set your thermostat

In winter heating can account for over 30% of your bill. Set your thermostat between 18 and 20 degrees. Every degree above 20 can add 10% to your heating bill. In summer, set your thermostat to 26 degrees or above.

4. Turn heaters and coolers off when you don't need them

Turn off when you leave the room, or go to bed. With some ducted heating systems you can turn off the heating in the rooms that are unoccupied. Make sure all your heating or cooling is turned off when you leave the house.

5. Wash clothes using cold water

You can save around $115 per year by washing clothes in cold water. You can also save by making sure you select the shortest appropriate washing cycle and waiting until you have a full load.

the others

6. Run your fridge efficiently

Your fridge is always on, making it one of your most expensive appliances. Make sure the door seal is tight and free from gaps so cold air can't escape. An ideal fridge temperature is 4 or 5 degrees and an ideal freezer temperature is minus 15 to minus 18 degrees Celsius. If you have a second fridge or freezer, only turn it on when you need it.

7. Insulate your roof

An insulated ceiling makes a big difference to your energy bills. If you already have insulation installed, check that it is properly installed and has the right rating (measured in 'R-value'). In Victoria, insulation rated R3.5 or higher should be used for ceilings.

8. Stop standby power waste

Did you know your phone charger is still using energy even when your phone is not attached? Up to 10% of your electricity could be used by gadgets and appliances that are on standby.

A standby power controller will automatically reduce standby time and switch appliances off when not in use. You may be eligible for a discounted standby power controller. See Energy Saver Incentive.

9. Save energy in the kitchen

Thaw frozen food in your fridge to reduce cooking time. When you are cooking, use the microwave when you can – it uses much less energy than an electric oven. If you use the stove, keep lids on your pots to reduce cooking time. Use the economy cycle on your dishwasher and only run it when it's full.

10. Use energy-efficient light globes

Replace old incandescent and halogen light globes with energy-efficient globes. Energy-efficient globes save power and last longer. Light globes can sometimes be replaced for free or at reduced cost. 

8 0
3 years ago
What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
Scrat [10]

Answer:

The Rouché-Capelli Theorem. This theorem establishes a connection between how a linear system behaves and the ranks of its coefficient matrix (A) and its counterpart the augmented matrix.

rank(A)=rank\left ( \left [ A|B \right ] \right )\:and\:n=rank(A)

Then satisfying this theorem the system is consistent and has one single solution.

Explanation:

1) To answer that, you should have to know The Rouché-Capelli Theorem. This theorem establishes a connection between how a linear system behaves and the ranks of its coefficient matrix (A) and its counterpart the augmented matrix.

rank(A)=rank\left ( \left [ A|B \right ] \right )\:and\:n=rank(A)

rank(A)

Then the system is consistent and has a unique solution.

<em>E.g.</em>

\left\{\begin{matrix}x-3y-2z=6 \\ 2x-4y-3z=8 \\ -3x+6y+8z=-5  \end{matrix}\right.

2) Writing it as Linear system

A=\begin{pmatrix}1 & -3 &-2 \\  2& -4 &-3 \\ -3 &6  &8 \end{pmatrix} B=\begin{pmatrix}6\\ 8\\ 5\end{pmatrix}

rank(A) =\left(\begin{matrix}7 & 0 & 0 \\0 & 7 & 0 \\0 & 0 & 7\end{matrix}\right)=3

3) The Rank (A) is 3 found through Gauss elimination

(A|B)=\begin{pmatrix}1 & -3 &-2  &6 \\  2& -4 &-3  &8 \\  -3&6  &8  &-5 \end{pmatrix}

rank(A|B)=\left(\begin{matrix}1 & -3 & -2 \\0 & 2 & 1 \\0 & 0 & \frac{7}{2}\end{matrix}\right)=3

4) The rank of (A|B) is also equal to 3, found through Gauss elimination:

So this linear system is consistent and has a unique solution.

8 0
3 years ago
What's the difference in unicode value between 'e' and 'a'? (consult a table of unicode values):?
ddd [48]
-4






--------------------------------------
3 0
3 years ago
When creating databases, the different pieces of information are input into _______.
Tanya [424]
Fields. This one had me in doubt. Different kinds of information go into different database tables. A table contains rows (=records) made up of fields. So a field is the smallest "thing" in a database (much like a cell in a spreadsheet). So yes, I'd say fields is the correct answer.
4 0
3 years ago
Other questions:
  • What channel will the republian debate be broadcast on?
    6·2 answers
  • Which step needs to be done before changing the font type, size, and color of a particular set of text
    7·1 answer
  • Should software companies be able to send automatic updates to your computer withoput your knowledge
    14·1 answer
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • Should i change my profile pic<br> dont delete
    15·2 answers
  • While saving her word-processed academic documents, Ashley includes the subject, title, and the author's name in the properties.
    7·1 answer
  • Is a tv a
    6·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • What is the output for the following program?
    6·2 answers
  • 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!