Background: Your director of communications has become suspicious as of late that your communications are being intercepted by an outside source. Your job is to propose a means to send secure messages to colleagues internally to keep your secrets safe. Your production team are ready to build a system that will enable the encryption to happen seamlessly (and programmatically) Your job is to decide how to encrypt communications. You should describe the modality for encryption in enough detail for your development team to be able to build and implement the proposed solution. We would like to see a proof-of-concept – either in pseudocode or as a description of the steps required to encrypt and decrypt the data. The message that we would like you to send as part of this PoC is as follows: Countless paths one destination You should describe your methodology/approach to encrypting the data in enough detail that an engineer would be able to build, implement and test the implementation using the phrase that you have been given to encode. Questions: 1. Describe the algorithm that you are proposing in as simple a way as possible. Include steps and stages to describe how it will work. 2. Describe a process by which you would encode and decode the message as a proof-of-concept. Take the idea from inception through to encoding the message using the encoding method you have chosen and then proceed to describe how such a message would be decoded in a practical way. 3. Describe the strengths and weaknesses of your proposed method and why it is suitable for the scenario given.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Background:

Your director of communications has become suspicious as of late that your communications are being intercepted by an outside source. Your job is to propose a means to send secure messages to colleagues internally to keep your secrets safe. Your production team are ready to build a system that will enable the encryption to happen seamlessly (and programmatically)

 

Your job is to decide how to encrypt communications. You should describe the modality for encryption in enough detail for your development team to be able to build and implement the proposed solution. We would like to see a proof-of-concept – either in pseudocode or as a description of the steps required to encrypt and decrypt the data.

 

The message that we would like you to send as part of this PoC is as follows:

 

Countless paths one destination

 

You should describe your methodology/approach to encrypting the data in enough detail that an engineer would be able to build, implement and test the implementation using the phrase that you have been given to encode.

 

Questions:

1. Describe the algorithm that you are proposing in as simple a way as possible. Include steps and stages to describe how it will work.

2. Describe a process by which you would encode and decode the message as a proof-of-concept. Take the idea from inception through to encoding the message using the encoding method you have chosen and then proceed to describe how such a message would be decoded in a practical way.

3. Describe the strengths and weaknesses of your proposed method and why it is suitable for the scenario given.

 

Expert Solution
steps

Step by step

Solved in 8 steps with 2 images

Blurred answer
Knowledge Booster
Encryption and decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education