Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Math Expert


Home >> Math

1. Caesar Substitution Cipher. Recall that a Caesar shift cipher identifies (A, B, ... , Z) with Z26 = (00, 01, . . , 25) and enciphers using a shift, x→ (x +k) mod 26 for some private key k. Knowing this, decipher

HSS PZ MHPY PU SVCL DHY HUK JYFWAVNYHWOF

2. RSA Cryptosystent. An RSA cryptosystem has public key (1050958331, 1019). It enciphers text in 3-character (9-digit) blocks, with each text character identified with its 3-digit ASCII code. For example, the 3-character plaintext string "Abz" is identified with the 9-digit string 065098122 of ciphertext, which is then enciphered using the RSA public key.

You intercept the message 652557294 075733184 encrypted with this public key. Can you decipher it?

3. Suppose C ⊆ Fq(n) is a linear code of length n over Fq. The automorphism group of the code C is

Aut(C) = {g ∈ GL(n, q) : gC = C}.

(a) Prove that Aut(C) is a group.

(b) Find the automorphism group of the repetition code {000, 111} of length 3 over F2.

4. Recall that the nonlinear S-boxes in AES make use of a natural bijection between the field F28 and the group algebra F2C8 which has no algebraic realization.

(a) Prove that F2C8 is not a field.

(b) How much can be said about the algebraic structure of F2C8 using the CRT for polynomials?

5. A cyclic linear code of length 6 over F5 has generator polynomial g(x) = x3 + 2x2 + 2x + 1. Text characters are encoded using the base 5 representation of their standard ASCII decimal number. For example B = 66 = 231 base 5 is identified with the message m(x) = 2x2 + 3x + 1, then encoded as g(x)m(x).

Suppose you receive the two character message

2x5 + 3x4 + x2 + 3,              2x4 + 2x3 + 3x2 + 4x + 4.

(a) Show that the first character in the received message is most likely error-free, and decode it.

(b) Show that the second character of the received message contains errors. Find the most likely error, decode it, and obtain the 2-character message.

6. One technique for creating regular LDPC codes is to use the incidence matrix of the Cayley graph of a group G with a relatively small generating set of involutions S. Vertices are the elements of the group, and there is an edge between x and y if x = ys for some s ∈ S.

(a) Recall that the dihedral group D10 is generated by two involutions a, b satisfying a2 = b2 = e and (ab)5 = e. Draw the Cayley graph associated with (D10, {a, b}). Find the 5 x 10 parity check matrix H for the LDPC code associated with this graph.

(b) In the LDPC code associated with the Cayley graph (D10, {a, b}), the message nodes are f1, ..., f5 where fi = (ab)i, i =1, ... , 5, and the check nodes are ci = fia,1, ... , 5. For a message to be valid, the value of each message node should be the sum modulo 2 of the values at the check nodes that are connected to it. In the LDPC decoding algorithm, the values of message nodes and check nodes are passed back and forth and adjusted to the most likely state at each stage. First the values of the L's are used to determine a list of likely values for each of their check nodes, then check nodes are adjusted to their most likely value, and then the new values of these ci's are used to adjust the values of the fi's.

If the received values are f1f2f3f4f5c1c2c3c4c5 = 0101100110, find the most likely actual message after one pass back and forth through the LDPC graph decoding algorithm. Use the parity check matrix to verify that this is a code-word.

7. Reed-Solomon Code. An RS-(7, 3, 5) code has length 7 and dimension 3 over F23 = F2(ζ), where ζ3 = ζ + 1. The code has designated distance 5, so the generating polynomial is g(x) = (x + ζ)(x + ζ2)(x + ζ3)(x + ζ4) ∈  F23 [X]. 8-bit hexadecimal ASCII symbols are first encoded as 9-bit strings by adding a check digit: For example: N = 4E in 8-digit ASCII becomes 010011100 as a 9-bit string, which is represented as the message polynomial m(x) = ζx2+ (ζ+1)x+ζ2.

It is desirable in transmission that the first part of the transmitted message contains the actual message. The first three blocks of the transmitted message is x4m(x), and the last four blocks are the remainder r(x) of x4m(x) divided by g(x).

Calculate the transmitted message c(x) = x4m(x) + r(x) that would be associated with the plaintext symbol ± = B1 in extended ASCII, and write this as a 21-bit binary string.

8. RS decoding. In the RS-(7, 3, 5) code of exercise 7, the 21-bit string 001010100111000001011 is received. Determine the most likely intended plain-text message symbol. How many bit errors occurred? How many symbol errors?

Math, Academics

  • Category:- Math
  • Reference No.:- M91793280

Have any Question?


Related Questions in Math

Assignment -question 1 let t and or 0 1 be a boolean

Assignment - Question 1. Let (T, ∧, ∨,', 0, 1) be a Boolean Algebra. Define ∗ : T × T → T and o : T × T → T as follows: x ∗ y := (x ∨ y)' x o y := (x ∧ y)' (a) Show, using the laws of Boolean Algebra, how to define x ∗ y ...

Question you will recommend a course of action regarding

Question: You will recommend a course of action regarding strategic planning in light of the issue the healthcare organization is facing. Be sure to address the following: 1. Provide a brief summary of the issue facing t ...

Questions -q1 prove the following identitiesa sinx y sinx

Questions - Q1. Prove the following identities a. sin(x + y) + sin(x - y) = 2 sin x cos y b. sec(x - y) = cos(x + y)/(cos 2 x - sin 2 y) c. tan 2 x - sin 2 x = (tan x sin x) 2 Q2. Solve the following equations for x ∈ [0 ...

Question 1 what is the nth order approximation using taylor

Question: 1. What is the nth order approximation using Taylor series? 2. What is Error Propagation? 3. Please explain what the total numerical error is? Please illustrate how the change of step size will affect the total ...

Instructionsthe aim of the assignment is that the

Instructions The aim of the assignment is that the student/group studies and applies numerical methods such as Euler's method, the Improved Euler's method and the Runge-Kutta method to solve first-order differential equa ...

Assignment - solving the five question in the very details

Assignment - Solving the five question in the very details, thanks a lot. Question - Let a ∈ P n be a point. Show that the one-point set {a} is a projective variety, and compute explicit generators for the ideal I p ({a} ...

Assessment taskpractical investigation- question 1 requires

Assessment Task Practical Investigation - Question 1 requires selecting reference points from the graph. It is expected that each student will choose different reference points to other students. Take note of the criteri ...

Maths assignment - 1 analysis of a data setusing a

Maths Assignment - 1. Analysis of a data set Using a continuous data set you are requested to collect in the types of data and gathering data section, perform a statistical analysis on your data. You have opportunities t ...

Mathematics- algebraic geometry problemlet k denotes an

Mathematics- Algebraic Geometry Problem Let K denotes an algebraically closed field and let P 1 be constructed as in Example 5.5(a) in Gathmanns notes, i.e. P 1 is the gluing of X 1 = A 1 and X 2 = A 1 along  the open su ...

Assignment - provide solution to the following questionsq1

Assignment - Provide solution to the following questions: Q1. Evaluate the following: ∫xsin3x dx Q2. If , then for what value of α is A an identity matrix? Q3. The line y = mx + 1 is a tangent to the curve y 2 = 4x. Find ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As