John keeps a list on his cell phone of all the passwords he uses to access...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
John keeps a list on his cell phone of all the passwords he uses to access different websites. However, he does not write the password fully but uses an encryption. To make things easier, we will assume that letters used in his passwords are only uppercase A-Z. Each letter is assigned a number between 0 and 25 (A: x=0, B: x=1... Z: x=25) and then the expression (15x+7) mod 26 = y is applied. Then y is mapped back to a letter. Example: A = 0, (15(0) + 7) mod 267 and 7 is mapped to H. B = 22 = W....etc. This function has a domain of {A, B, C... Z} and a co-domain of {0...25}. Questions A. We purposely picked 26 and 15 because they are relatively prime and thus, the greatest common divisor gcd (26, 15) = 1. We also know there exists a linear combination of 16 and 15 such that 26a + 15 b = 1. Determine (a, b). Show calculation. B. For the code to work as a good encryption scheme, we need to prove that every unique letter in the domain maps to a unique number in the co-domain. Prove that the code is injective. C. Now that we know how to encrypt a letter, it would be useful to be able to decrypt. For decryption to work properly, we need to prove that given an arbitrary number y in the co-domain 0 thru 25, we can find the number in the domain that maps (or encrypts) to y. In other words that the code is surjective. Prove that this code is surjective. [Hint: use the answer from A] D. One of John's encrypted password is HADGFJDGAZ. What is the actual password? John keeps a list on his cell phone of all the passwords he uses to access different websites. However, he does not write the password fully but uses an encryption. To make things easier, we will assume that letters used in his passwords are only uppercase A-Z. Each letter is assigned a number between 0 and 25 (A: x=0, B: x=1... Z: x=25) and then the expression (15x+7) mod 26 = y is applied. Then y is mapped back to a letter. Example: A = 0, (15(0) + 7) mod 267 and 7 is mapped to H. B = 22 = W....etc. This function has a domain of {A, B, C... Z} and a co-domain of {0...25}. Questions A. We purposely picked 26 and 15 because they are relatively prime and thus, the greatest common divisor gcd (26, 15) = 1. We also know there exists a linear combination of 16 and 15 such that 26a + 15 b = 1. Determine (a, b). Show calculation. B. For the code to work as a good encryption scheme, we need to prove that every unique letter in the domain maps to a unique number in the co-domain. Prove that the code is injective. C. Now that we know how to encrypt a letter, it would be useful to be able to decrypt. For decryption to work properly, we need to prove that given an arbitrary number y in the co-domain 0 thru 25, we can find the number in the domain that maps (or encrypts) to y. In other words that the code is surjective. Prove that this code is surjective. [Hint: use the answer from A] D. One of John's encrypted password is HADGFJDGAZ. What is the actual password?
Expert Answer:
Related Book For
Quantitative Analysis for Management
ISBN: 978-0132149112
11th Edition
Authors: Barry render, Ralph m. stair, Michael e. Hanna
Posted Date:
Students also viewed these programming questions
-
can someone solve this Modern workstations typically have memory systems that incorporate two or three levels of caching. Explain why they are designed like this. [4 marks] In order to investigate...
-
List three specific parts of the Case Guide, Objectives and Strategy Section (See below) that you had the most difficulty understanding. Describe your current understanding of these parts. Provide...
-
Suppose that there is parity between the Australian dollar and the United States dollar. Let x be a positive number and assume that the United States dollar increases by 100x % in Australian dollars....
-
Recall that an exponential () random variable X has E[X] = 1/, Var[X] = 1/ 2 . Thus, to estimate from n independent samples X 1 , . . ., X n , either of the following techniques should work. (a)...
-
Multiple Choice Questions 1. Emilio buys pizza for $10 and soda for $2. He has income of $100. His budget constraint will experience a parallel outward shift if which of the following events occur?...
-
Your business purchased supplies of \($1,000\) on account. The journal entry to record this transaction is: a. Supplies 1,000 Accounts receivable 1,000 b. Accounts payable 1,000 Supplies 1,000
-
The Bailey Machine Tool Company thinks it can increase sales by $10 million by loosening its credit standards somewhat. The firm normally experiences bad debts of about 2% of sales, but marketing...
-
Does ESG investing incorporate ethics and is there a possibility that this channel may catalyze needed change? Would it be possible to get guidance on this, such as ideas, references etc. I am...
-
What are the major causes of information risk? How can information risk be reduced?
-
When Ben Jones decided to start his own business, he needed to borrow a large sum. He was able to borrow $200,000 from a bank at a 5% interest rate over a four-year loan period starting on the 1st of...
-
How is a consumer debtor defined?
-
A(n) ____________ occurs when a speaker signals to the audience that the presentation is concluding but keeps going by introducing more information.
-
What is a transfer under value?
-
In what ways do governments attempt to promote exports? Are export subsidies permissible?
-
What is the effect, in bankruptcy law, of a proposal?
-
1. Prepare manual entries and complete the general and subsidiary ledgers. 2. Prepare an account receivable and account payable reconciliation of the subsidiary ledger accounts to the control...
-
H Corporation has a bond outstanding. It has a coupon rate of 8 percent and a $1000 par value. The bond has 6 years left to maturity but could be called after three years for $1000 plus a call...
-
Ray Bond, from Problem 1-15, is trying to find a new supplier that will reduce his variable cost of production to $15 per unit. If he was able to succeed in reducing this cost, what would the...
-
A company has decided to order 360 units whenever the on-hand inventory falls to 90 units. There appears to be no seasonal fluctuation to the demand, but it does fluctuate daily and is approximately...
-
What are the major differences between PERT and CPM?
-
Identify a company that integrates goods and services similar to the LensCrafters example. Use the framework in Exhibit 5.1 to write a short case study about the company in a similar fashion as the...
-
Airbags are designed to protect passengers from frontal or near-frontal crashes. Their designs and performance have improved dramatically since their introduction in the 1980s. Exhibit 5.19 shows a...
-
Glen County manages a waste-to-energy facility that burns 2,000 tons of trash per day and generates over \($20\) million in electricity annually while costing state and local taxpayers \($24\)...
Study smarter with the SolutionInn App