Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Now lets look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message left

Now lets look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message left 2 positions, XOR the bits with the key, and rotate the bits 4 positions to the right.

a)A key encoded within a spam email message will be emailed to you. Please be on the lookout for this message. Once you receive the email go to http://www.spammimic.com/ and click on Decode. Cut and paste the body of your email into the Decode window and get the key. The key will be 2 hex numerals. If you do not get 2 hex numerals when you decode the message, you haven't copied the entire email message correctly. What is the key?

b)Using the key and the above algorithm, decrypt the following name (given in hex): 4F 48 4B 12 4F 4E CA 09 0E. Remember that you will have to reverse the order and direction of operations in order to decrypt the message (i.e. start by rotating 4 positions left). What is the message?

c).The answer to Part (b) is the nickname of a famous actor. Find (and state) the last name of this actor in upper case. Using the key and the above algorithm, encrypt the last name of this actor (in upper case) and put in hex format.

The key for part (a) is A5.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database And SQL

Authors: Lucy Scott

3rd Edition

1087899699, 978-1087899695

More Books

Students also viewed these Databases questions