Discuss the myth of unbreakable code including the most common code-breaking techniques. Can encryption algorithms be broken? Research frequency analysis, brute force attack or other code-breaking methods. Describe the use of one of these techniques
Discuss the myth of unbreakable code including the most common code-breaking techniques. Can encryption
The first step in sending a message would be for the sender to tell the receiver to start listening for random numbers at a particular time, or both parties could constantly be attending so that the numbers to be used could be collected over days or weeks instead of minutes.
Both parties would listen for and record a minute subset of the random broadcast numbers, which was small enough to be easy to register. This system was set up ahead of time and was controlled by a key.
Then, the sender would use these numbers to encipher the message, and the receiver would use them to decipher it.
An eavesdropper trying to figure out the key of the prearranged system used to pick the random numbers used to encipher the message would need to be able to look at all the random broadcast numbers because the eavesdropper wouldn't know which ones were the right ones until he had broken the code.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps