Find Jobs
Hire Freelancers

Course assignment, focus on Cryptography - Repost - Repost - open to bidding

$30-250 AUD

Closed
Posted over 9 years ago

$30-250 AUD

Paid on delivery
1. Simon works in a government office where encrypted messages are regularly received. He knows that an affine cipher is the standard method of encryption used by the office, and has access to the machine which [login to view URL] day, when there is not much work to do, Simon decides to work out the affine function used in the machine. He inputs 1 and the machine outputs 5. He inputs 2 and the machine outputs 19. Show how he uses this to obtain the function.nnn2. Patrick and Jacquie both use the same Hill cipher based on the matrixnM = |2 13|n |23 1|n to send each other encrypted messages.n(a) Without using Maple, show how Patrick uses M to encrypt the message:n` The room for the PASS session has changed.'n(b) In order to decrypt Patrick’s message, Jacquie must invert M. What matrix doesnshe obtain? Do not use Maple.nn3. The name L011 stores the first terms of an LFSR output. n(a) Using Maple,ndetermine the recurrence formula used to generate it. n(b) Use the recurrence formulanto find the next term in the sequence. nn4. Using the Euclidean Algorithm, find the inverse of 2563 modulo 3127. Show allnyour work and do not use Maple.
Project ID: 6355611

About the project

4 proposals
Remote project
Active 10 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
4 freelancers are bidding on average $144 AUD for this job
User Avatar
A proposal has not yet been provided
$77 AUD in 2 days
5.0 (2 reviews)
2.8
2.8
User Avatar
I have MS in Information Security with research interest of Cryptography. I have implemented Cryptography algorithms in Java and C, written security solutions in J2EE and Java, have implemented datastructures in Java, and built two websites for research / proof-of-concept purposes. Additionally, ~2 years of IT experience. I have taken Graduate level courses in Cryptography and Security that dealt with analysis of Cryptographic protocols, my Masters level project involved design of a Cryptographic protocol for a specific authentication problem in three-party settings. I have executed a number of projects that focussed almost entirely / heavily on Cryptography. I have also written Cryptographically signed Java applet for a J2EE application. Details about projects executed available on request. You might want to go through reviews project creators left for me on freelancer.com, see https://www.freelancer.com/u/ciphe.html.
$333 AUD in 10 days
5.0 (2 reviews)
2.8
2.8
User Avatar
Dear, I can do this work..I did MS in information security and having sound knowledge of cryptosystems..if you are willing let me know
$66 AUD in 3 days
0.0 (0 reviews)
0.0
0.0

About the client

Flag of AUSTRALIA
Australia
0.0
0
Member since Aug 20, 2014

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.