Question: Principles of Information Security W3: Develop a brief report (MLA style) answering the following questions: a. Briefly explain why asymmetric encryption is called public key

Principles of Information Security

Principles of Information Security W3: Develop a brief report (MLA style) answering

W3: Develop a brief report (MLA style) answering the following questions: a. Briefly explain why asymmetric encryption is called public key encryption. b. What is the ciphertext for COMPUTERSECURITYISAWESOME using a shift cipher with shift key k=6 ? c. Using the Vigenere cipher (page 85), encrypt the message ILOVECOMPUTERSCIENCE using the key PASSWORD. d. The RSA algorithm is explained beginning on page 137 in the textbook. Given p=11,q=3, n=33,e=3, and d=7. Decrypt a four letter cypher text message with the following values 142821 to the plaintext ordinal values of the alphabet, for example a=1,b=2,z=26. Translate the decrypted numeric ordinal values to text. What is the plaintext? Show your work. e. Describe the steps involved in obtaining a personal certificate for email usage

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!