Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Alice and Bob meet and agree to use the code C:{,a,b,c,,z}{0,1,2,3,26},C()=0,C(a)=1,,C(z)=26 to map characters to integers and to use the function E:{0,1,2,3,26}>{0,1,2,3,26}E(x)=((5x)3)mod27 for encryption. The
Alice and Bob meet and agree to use the code C:{,a,b,c,,z}{0,1,2,3,26},C()=0,C(a)=1,,C(z)=26 to map characters to integers and to use the function E:{0,1,2,3,26}>{0,1,2,3,26}E(x)=((5x)3)mod27 for encryption. The inverse of the function E is E1:{0,1,2,,26}{0,1,2,,26}E1(x)=((11x)+21)mod27. They also agree to send their messages as sequences of integers. Alice wants to send Bob the secret message: leaf She encodes the characters with the function and obtains: C(1)=C(e)=C(a)=C(f)= She encrypts these with the function E and gets E(C(1))=E(C(e))=E(C(a))=E(C(f))= Alice sends these integers to Bob. Bob receives the message and evaluates the function E1 at the integers send by Alice: E1(E(C(1)))=E1(E(C(e)))=,E1(E(C(a)))=E1(E(C(f)))= An application of C1 yields: C1(E1(E(C(1))))=C1(E1(E(C(e))))=C1(E1(E(C(a))))=,C1(E1(E(C(f))))=
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started