Explanation of Solution
Right of individuals to make alterations:
“No”, the individual person has no right to decrypt the internal structure of a product.
Reason:
A company when develops a new product or system then the company patents it. Patent is the right permitted by the government to the inventor to protect his original work of creation from duplication for a limited time. Any other person cannot use, modify, develop, or sell the creation without the permission of the original creator.
When a company develops a product whose internal structure is encrypted and patents it then it is illegal to make any alteration or modification and distribution of the product even if the person buys the product.
An individual has no right to make any modifications in the product which is developed by other person or company.
Right of individuals to use a company’s product information for commercial manner:
“No”, an individual has no right to use company’s product information in a commercial manner.
Reason:
When a company develops a product and patents it then it is illegal to use and distribute the product without the consent of the owner. An individual in any case, has no right to use the company’s product for commercial purpose.
A person has no right to use the product of a company for commercial purpose, only the company has the right to take decision...
Want to see the full answer?
Check out a sample textbook solutionChapter 12 Solutions
Computer Science: An Overview (12th Edition)
- Suppose you were given a number of different ciphertexts and you are told that they are each encryptions of plaintexts using a Caesar cipher-type encryption but with different keys and different plaintext languages from around the world. You are asked to try to work out the most likely language of each ciphertext. Explain how you would approach this problem.arrow_forwardIn a system an RSA algorithm with p=5 and q=11, is implemented for data security. What is the value of the decryption key if the value of the encryption key is 27?arrow_forwardQuestion 1 Study the scenario and complete the question(s) that follow: Ceasar Cipher The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It's simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B, B would become C, and so on. The method is apparently named after Julius Caesar, who apparently used it to communicate with his officials. 1.1 Write a Ceasar cipher algorithm in such a way that a character D is changed to N. Derive the encryption of the other characters accordingly. 1.2 Based on your algorithm, what will be the encrypted code of the message “my mother is not home". End of Question 1arrow_forward
- Computer Science Based on DES, find the ciphertext if the shared key is "SECURITY" and the output of round 15 is "IT? 7b/".arrow_forwardUse the two prime numbers p = 5 and q =13 in the first step to give ONE integrated example to show how the five steps in the basic process of RSA Cryptography works. Based on your example, demonstrate how the number 60 as an original message is encrypted into ciphertext and decrypted back correctly to the original message. If you need to choose a number in any step, you must choose it from the set {x e R: 8 s x< 12}. You must show all detailed steps involved.arrow_forwardConsider the RSA encryption algorithm with p = 59, q = 47, e = 15. 1. What is the public key? 2. What is the private key?arrow_forward
- For practical encryption that involves secret message transmission from Alice to Bob, why is the message encrypted with the shared symmetric key rather than Bob's public key? What is the significance of using Bob's public key to encrypt the shared symmetric key?arrow_forwardAssume there is a Certificate Authority (CA) with a well-known public key. Further assume every user is issued a certificate for his/her public key. For convenience, we use PKu and SKu to represent user’s public key and private key, respectively. Draw diagrams to answer the following questions. a) Suppose Alice wants to send a large secret message M to Bob. Describe how Alice should send M in an authenticated way. b) Assume Bob receives the message sent by Alice. Describe how Bob should process the message. c) Suppose Alice needs to send a number of large secret messages to Bob. Alice would like to avoid signing digital signatures for all these messages. Develop a protocol for Alice and Bob so that all the messages can be sent in a confidential and authenticated way. Briefly describe the intuition of your protocol first and then draw a diagram.arrow_forwardExplain Thwarting Output-Guessing Attacks in Logic Encryption.arrow_forward
- Perform the Encryption using the Vigenere cipher for the following: Messege= "discovery", and Key="google".arrow_forwardPart 1: Please answer the following questions about the fundamental of cryptography. Each question has only one correct answer. 1, Which description about block ciphers is NOT correct? Block ciphers encrypt the message block by block. A block cipher with a small block is vulnerable to the codebook attack. The encryption and decryption algorithms in block ciphers use the same secret key. The key length for block cipher should be very short to defend against the exhaustive key search attacks. 2, If the key length of a block cipher is 64 bits, what is the size of the key space? Hint: The key space consists of all possible keys. 64 264 232 2128 3, Modern block ciphers combine substitution S and permutation P operations to improve security. Based on the security rule, the cipher should not use consecutive substitutions or consecutive permutations. In the following combinations, which one violates the above security rule? ?1?1?2?2 B. ?1?1?2?2 C. ?1?1?2?2 4, Which…arrow_forwardLet's say you generated RSA keys and you chose p=53, q=41, and the smallest encryption exponent that qualifies for this p and q. (You will have to follow the key generation algorithm to fill in the details.) If someone gives you 343 as the ciphertext they created using your public key, what is the plaintext you get when you use your private key to decrypt? Also note that you can test your answer by encrypting it and making sure you get 343 back.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education