العودة   عروض موضة 2013 , ازياء 2013 , فساتين 2013 , تاجرات > عالم حواء 2014 > عالم حواء > موضة 2013 فساتين سهرة 2014 لانجري 2014

موضة 2013 فساتين سهرة 2014 لانجري 2014 ملابس ماركات عالمية وأحدث الموديلات

main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not?

main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? ...

إضافة رد
 
LinkBack أدوات الموضوع انواع عرض الموضوع

  #1  
قديم 11-09-2013
المهندس أحمد غير متواجد حالياً
عضو
 
تاريخ التسجيل: Nov 2013
المشاركات: 3,169
افتراضي main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not?

حل واجبات الجامعة العربية المفتوحة
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora

حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة


حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5




T215B: Communication and information technologies
__________________________________________________ ____________________________
Tutor-Marked Assignment
__________________________________________________ ___________________________
Part 1: Cryptography

As an AOU student, suppose that you were attending a T215B discussion session during which many questions about data encryption in general were raised as well as other questions about a well-known cryptographic algorithm called RSA in particular. Those can be summarized as follows:
• Encryption:
 What is encryption?
 What is it used for?
 What are its advantages and disadvantages?
• Symmetric key cryptography:
 What is symmetric key cryptography?
 What are its applications?
 What are its advantages and disadvantages?
• Asymmetric and public key cryptography:
 What is asymmetric key cryptography and why it is usually called public key cryptography?
 What are its applications?
 What are its advantages and disadvantages?
• Modular arithmetic:
 What is Modular arithmetic in general?
 What are Modular addition, multiplication and exponentiation? Examples?
• Factorizing large prime numbers:
 What is a prime number?
 How large prime numbers can be useful to cryptography?
• RSA keys generation technique:
 What is RSA algorithm?
 How to create the RSA public and private keys?
Since the students were highly interested and motivated to understand what encryption and RSA algorithm are about, the mentor of this discussion session asked you as an active participant to elaborate reliable answers to these raised questions by editing a medium length report (1000-1200 words). He also offered you the opportunity to present this report to all your classmates during the next discussion session.
In this question of the TMA, you are supposed to edit the requested report taking into consideration the following points:
 Your report should be between 1000 and 1200 words in length. Under-length and over-length reports will be penalized.
 Your report must provide reliable answers for all the above questions.

 You might need to form some idea of how many words you need to give to each concern.

 Your report should include titles, subtitles and at least two figures and/or tables. Do not forget to include captions and to use cross-referencing.
 Ensure that your report meets the objectives, has an appropriate structure and style, and that its technical level is appropriate for the audience, purpose and medium. For more details, you can refer to the T215 textbooks (Block 1 – Part 7; Block 2 – Part 7; Block 3; Block 4 – Part 8).
 Your report should be based on reliable resources (i.e. journal articles, technical reports, conference papers, international textbooks) and you should provide a reference list at the end of your report. The references should be in a standard form.
 You are advised to remind yourself of the issues concerning plagiarism.
Part 2: Securing a report

The Arab Open University – AOU – is a multinational university with several branches around the Arab World. Recently, it has been earning itself a reputation for its success in credibility and high educational issues. Suppose that you are working as a financial expert in one of the AOU’s Branches and that you were asked to edit a highly confidential report about the financial activities at your Branch. After two weeks of hard work, you finalized the report and now it is ready to be delivered.
However, as per an urgent request from the AOU headquarters, your Branch Director was invited to attend an urgent meeting outside the country to discuss your Branch’s financial activities and he hence asked you to send him by email a soft-copy of the report you prepared taking into consideration the sensibility of the information it contains.
In this question of your TMA, you are supposed to investigate three different encryption techniques and to deduce which one of them provides for your report the highest level of confidentiality.
2.A. Privacy, surveillance and security threats
Based on what you learned in T215B about “Privacy and Surveillance”, discuss two different kinds of threats that might confront your confidential report when it is sent by email to your Branch director. (Respect a maximum word count of 200 words).

In all the following questions and for simplicity reasons, suppose that your report contains the following sentence: “High Profit”.

2.B. Caesar Cipher
a) In no more than 150 words explain the Caesar encryption technique.
b) Use Caesar algorithm to encrypt the content of your report with a key K=14.

c) Does the Caesar Cipher ensure a high level of security? What are its drawbacks? Explain.

d) What is the decryption key your director should use to decrypt the encrypted report?
2.C. Caesar Cipher with Diagraph Coding
a) In no more than 150 words explain the main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not?
b) Use Caesar Cipher with Diagraph Coding to encrypt the content of your report with a key K=321.
2.D. Vigenère Cipher
a) In no more than 150 words explain the main idea of the Vigenère Cipher. Does it ensure a high level of security? What can make it an unbreakable cipher? Illustrate.
b) Use the keyword “zratxhuekf” to encrypt the content of your report using the Vigenère Cipher.
c) What is the keyword that might be used to decrypt the ciphertext?
2.E. Recommendations
Which of the previously studied ciphers would you recommend using to encrypt your report before sending it to your Director? Give strong arguments for you recommendation.
Notes for Question 2:
 In questions 2.B.b, 2.C.b and 2.D.b, you are requested to illustrate, step by step, how you have applied each encryption technique.
 You can use external reliable resource(s) to elaborate your answers but ensure that you provide its (their) reference(s) at the end of your answer. The reference(s) should be in a standard form.
 You are advised to remind yourself of the issues concerning plagiarism.
***************************
End of TMA
حل واجبات الجامعة العربية المفتوحة
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora

حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة


حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5




main idea of Diagraph coding> Does its implementation in a Caesar Cipher algorithm increase the security level ciphertext? WhyLWhy not? caesar cipher diagraph does whyLwhy

رد مع اقتباس

إضافة رد

مواقع النشر

الكلمات الدليلية
algorithm, caesar, cipher, ciphertext?, coding., diagraph, does, idea, implementation, increase, level, main, not?, security, why/why
أدوات الموضوع
انواع عرض الموضوع

ضوابط المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code متاحة
كود [IMG] متاحة
كود HTML معطلة
Trackbacks are متاحة
Pingbacks are متاحة
Refbacks are متاحة

[COLOR=#000000] [COLOR=#000000] [COLOR=#000000] [/COLOR][COLOR=#000000][/COLOR]

main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not?

المواضيع المتشابهه للموضوع: main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not?
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
the main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext المهندس أحمد موضة 2013 فساتين سهرة 2014 لانجري 2014 0 11-09-2013 08:20 PM
explain the main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not? المهندس أحمد موضة 2013 فساتين سهرة 2014 لانجري 2014 0 11-09-2013 08:13 PM
a) In no more than 150 words explain the main idea of Diagraph coding. Does its implementation in a Caesar Cipher algorithm increase the security level of the ciphertext? Why/Why not? المهندس أحمد موضة 2013 فساتين سهرة 2014 لانجري 2014 0 11-09-2013 08:13 PM
Does the Caesar cipher ensure a high level of security? What are its drawbacks? Explain. المهندس أحمد موضة 2013 فساتين سهرة 2014 لانجري 2014 0 11-09-2013 08:11 PM
c) Does the Caesar cipher ensure a high level of security? What are its drawbacks? Explain المهندس أحمد موضة 2013 فساتين سهرة 2014 لانجري 2014 0 11-09-2013 08:10 PM



دورة ( استراتيجيات التفاوض ) بقيادة أ. ندى سبيه 13/ 11 هـ ( مجاناً للجميع ) @ دورة نظام الإدارة المتكامل qhse بخصم 50% @ اعلن عن كل منتجاتك مجانا مع الديلر @ دورة ( التصوير الفوتوغرافي ) بقيادة أ. منار الجامع 11-12 / 11هـ ( مجاناً للسيدات ) . @ هل تريد السفر لا تفكر ولا تحتار @ برنامج تحليل التواقيع بقواعد القوس والوتر .. برنامج تحليل الرسومات والأشكال @ وظائف خالية , وظائف شاغرة @ قبول جامعي في امريكا @ دورة نظام الإدارة المتكامل qhse بخصم 50% @ وظائف خالية @



الآراء الواردة في المشاركات والمواضيع تعبر عن أصحابها وليس عن إدارة المنتدى