Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this assignment we'll being applying cryptography and cryptanalysis methods. This will require you to understand and identify principles of information assurance and the use

In this assignment we'll being applying cryptography and cryptanalysis methods. This will require you to understand and identify principles of information assurance and the use of appropriate software tools. Please submit the answers in a .pdf file that includes your name, the assignment number, the original questions, and of course your answers.

1. If you download a file and the source site states that the MD5 checksum of the attached file "Assignment 2.1 - MD5.txt" should be 76fd438c5783ca26247a4e020c05c61c, would you have compelling reason to believe that it has been replaced by malware?

2. The attached file "Assignment 2.2 - Sub Cipher.txt" is the text of the first chapter of an English language book encrypted with a substitution cipher. Using your cryptanalytic skills, what is the title of the book?

3. Theres a message hidden in the attached file "Assignment 2.3 image.png" file. What is the third word?

Extra credit: What are the first 4 characters of blackboard.albany.edu's public key?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Get Funded The Startup Entrepreneurs Guide To Seriously Successful Fundraising

Authors: John Biggs, Eric Villines

1st Edition

1260459063, 978-1260459067

Students also viewed these Databases questions