Concept explainers
(Enforcing Privacy with Cryptography) The explosive growth of Internet communications and data storage on Internet-connected computers has greatly increased privacy concerns. The field of cryptography is concerned with coding data to make it difficult (and hopefully—with the most advanced schemes—impossible) for unauthorized users to read. In this exercise you’ll investigate a simple scheme for encrypting and decrypting data. A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your application should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then print the encrypted integer. Write a separate application that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. [Optional reading project: Research “public key cryptography” in general and the PGP (Pretty Good Privacy) specific public key scheme. You may also want to investigate the RSA scheme, which is widely used in industrial-strength applications.]
Trending nowThis is a popular solution!
Chapter 4 Solutions
EBK JAVA HOW TO PROGRAM, LATE OBJECTS
- Question # 5:a) Find keys d and e for the RSA cryptosystem where p=5, q=3b) Encrypt the following plaintext BAc) Decrypt your cipher-text n question b) Remember: i need a Mathematics solution not computer program You must show all the steps of your workarrow_forward1. Secret Spy Code by CodeChum Admin Agent 007, I found some numbers written on the wall which could be the key to unlocking the room that holds the president's daughter!!! Unfortunately, when I tried inputting the numbers to the lock, it didn't work. What's that you say? Try reversing the numbers? Why, that's absolutely brilliant! Come on, we gotta hurry, the bomb is about to blow! Input 1. The number written on the wall Constraints The value is within the range: 0 <= n <= 2147483647. Output The first line will contain a message prompt to input the number. The second line contains the reverse of that number. Enter the number: 75 57arrow_forwardComputer Science C Language, please make method as simple and basic as possible thank you :) When creating a social media account, you can get an automatically generated password sent to you 152 days after you create your profile. Write a program that reads the year, month and day of your account creation, and then prints the year, month and day that you become eligible for a new password. Leap years should also be taken into account.arrow_forward
- Practice: Write a computer program (in Java or Python) that implements a cryptosystem based on one of the following encryption algorithms. Publick-key encryption (Java) Playfair (Python)arrow_forward(Taken from Ethics for the Information Age book) • Adam and Charlene are good friends. Both attend East Dakota State University. One day when Adam is off campus interviewing for a part-time job, someone asks him how many credit hours of computer science courses he has completed. Adam calls Charlene and asks her to access his student records by logging into the campus mainframe as if she were Adam. He provides Charlene with his student identification number and password so that she can do this. Is it wrong for Adam to share this information with Charlene? Is it wrong for Charlene to retrieve this information for Adam?arrow_forward9. A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9, inclusive. How many possible PINS are there?arrow_forward
- Q: A computer encryption system uses 20-bit encryption. To improve security, the system is upgraded to use 24-bit encryption. How much more secure is the new encryption scheme?arrow_forwarde) 11 players football team doing great in several tournaments. Unfortunately, one of the strikers got injured and replaced. He was a star player of the team. After his replacement, his team starts to perform badly. It looks like the whole team depending on one single player. Relate the above story with one of our cryptographic theories and provide an explanation.arrow_forwardCryptography problem A child has learned about affine ciphers. The parent says NONONO. The child responds with hahaha, and quickly claims that this is a decryption of the parent’s message. The parent asks for the encryption function. What answer should the child give?arrow_forward
- Computer Science Encyrpt this message using AES algorithm for Round1. All encryption steps has to be shown clearly. Plaintext: Two One Nine One Key: This is my Rulesarrow_forward(Taken from Ethics for the Information Age book) • Think about the last piece of consumer electronics you purchased. How did you first learn about it? What factors (features, price, ease of use, etc) did you weigh before you purchased it? Which of these factors were most influential in your purchase decision? Are you still happy with your purchase? • Consider a small business that is the victim of a cryptographic ransomware attack. The business does not have adequate backup files, and the cost of paying the ransom is much lower than the expected cost of continuing operations without the encrypted files and recreating the necessary records. Discuss the morality of the owner choosing to pay the ransom in order to recover the business’s files. • Are they any technologies that you wish had never been adopted? If so, which ones? Why?arrow_forward123. Packet Sniffer is a) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. b) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. c) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. d) None of thesearrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education