Concept explainers
(Enforcing Privacy with Cryptography) The explosive growth of Internet communications and data storage on Internet-connected computers has greatly increased privacy concerns. The field of cryptography is concerned with coding data to make it difficult (and hopefully—with the most advanced schemes—impossible) for unauthorized users to read. In this exercise you’ll investigate a simple scheme for encrypting and decrypting data. A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your application should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then print the encrypted integer. Write a separate application that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. [Optional reading project: Research “public key cryptography” in general and the PGP (Pretty Good Privacy) specific public key scheme. You may also want to investigate the RSA scheme, which is widely used in industrial-strength applications.]
Trending nowThis is a popular solution!
Chapter 4 Solutions
EBK JAVA HOW TO PROGRAM, LATE OBJECTS
- Question # 5:a) Find keys d and e for the RSA cryptosystem where p=5, q=3b) Encrypt the following plaintext BAc) Decrypt your cipher-text n question b) Remember: i need a Mathematics solution not computer program You must show all the steps of your workarrow_forwardCryptography: Alice is setting up an RSA key pair. She selects two prime numbers: 3319, 9397 and selects e = 3271. What are Alice’s public and private keys and what does she broadcast to make them usable? Then encrypt the following using her public key: HELLO WORLDarrow_forward1. Secret Spy Code by CodeChum Admin Agent 007, I found some numbers written on the wall which could be the key to unlocking the room that holds the president's daughter!!! Unfortunately, when I tried inputting the numbers to the lock, it didn't work. What's that you say? Try reversing the numbers? Why, that's absolutely brilliant! Come on, we gotta hurry, the bomb is about to blow! Input 1. The number written on the wall Constraints The value is within the range: 0 <= n <= 2147483647. Output The first line will contain a message prompt to input the number. The second line contains the reverse of that number. Enter the number: 75 57arrow_forward
- 9. A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9, inclusive. How many possible PINS are there?arrow_forwardQ: A computer encryption system uses 20-bit encryption. To improve security, the system is upgraded to use 24-bit encryption. How much more secure is the new encryption scheme?arrow_forwardCryptography problem A child has learned about affine ciphers. The parent says NONONO. The child responds with hahaha, and quickly claims that this is a decryption of the parent’s message. The parent asks for the encryption function. What answer should the child give?arrow_forward
- Computer science In terms of encryption, what is the difference between file encryption and disc encryption?arrow_forwardAddress ValidationImagine you get a data set from a client that contains addresses from 150 countries all around the world and your task is to verify it, the data is stored in 3 fields – Address Line, City, and ZIP code. What you also have available is an address verification solution for each country, but the data set does not include the country code. Your task is to design a logic that will process the data and find the related country for each record, so they can be run through the relevant validation component. Think of the most efficient way. Describe your solution proposal ideally in an algorithmic way (e.g. using appropriate UML diagrams, pseudo-code, list of steps…)Hint: Running all of those 150 address verification components against each record is not considered efficientarrow_forwardData Encryption Standard Perform a Data Encryption Standard encryption on the plaintext (PL) by using key (K). The PL is your first 8 characters of your name and K is the last 8 digits of your student ID. For example: Name: Siti Fajar Plain text (PL): SITIFAJA Student ID: 201908040016 Key (K): 08040016 Show detail step by step involved.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education