Essay Available:
You are here: Home → Term Paper → Literature & Language
Pages:
2 pages/≈1100 words
Sources:
1 Source
Level:
APA
Subject:
Literature & Language
Type:
Term Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 17.28
Topic:
Converting Numbers From Binary To Hexadecimal Or Vice Versa And Encryption (Term Paper Sample)
Instructions:
converting numbers from binary to hexadecimal or vice versa and encryption
source..Content:
Question 1
[5 marks] Let’s get some practice with the binary and hexadecimal number systems
Convert the hex value A1B2C3 into binary
1010 0001 1011 0010 1100 0011
Convert the binary value 1100 0000 0001 1101 1100 1010 1011 0101 into hex.
C01DCAB5
Convert the binary value 1000 0100 0010 0001 0011 0110 1100 1111 into hex.
842136CF
What is ABCFFE + 2 equal to (assuming hex values)?
1010 1011 1100 1111 1111 1110 0000 0000 0000 0010
What is 133AC + AC567 equal to (assuming hex values)?
0001 0011 0011 1010 1100 0000 0000 0000 1010 1100 0101 0110 0111
Question 2
[4 marks] Now let’s get some practice converting text to its hex equivalent value.
What is the ASCII representation in hex for the word Crime?
43 72 69 6d 65
What is the ASCII representation in hex for the word HACKER?
48 41 43 4b 45 52
What is the ASCII representation in hex for the phrase Good Luck?
47 6f 6f 64 20 4c 75 63 6b
What is the text message represented by the following hex digits?
4F 6E 63 65 20 55 70 6F 6E 20 41 20 54 69 6D 65
Once Upon A Time
Question 3
[7 marks] Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message
from a known Celtic hacker group. We know from experience that this group uses the characters
from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving
left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase “Trudy Jones”. For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message.
a. What is the message hidden in du yd JQD8FQXFTCDLK? Remember that you’ll have to
reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message.
LUZ AURANGZEB
b. The message is actually describing a fictional character. What would the encrypted name
of this character be using the same encryption scheme as the original message?
/MJ9kE1FOmH9uj5NANtrCKHMm7bytjlrBpOGrS8QNg4=
Question 4
[9 marks] Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this
system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate
the bits 8 positions to the left.
a. I will email you the key which is encoded within a spam email message. Once you receive
the email go to / and click on Decode. Cut and paste the body
of your email into the Decode window and get the key. The key will be 2 hex numerals. If
you don't get that when you decode the message, you haven't copied the e...
[5 marks] Let’s get some practice with the binary and hexadecimal number systems
Convert the hex value A1B2C3 into binary
1010 0001 1011 0010 1100 0011
Convert the binary value 1100 0000 0001 1101 1100 1010 1011 0101 into hex.
C01DCAB5
Convert the binary value 1000 0100 0010 0001 0011 0110 1100 1111 into hex.
842136CF
What is ABCFFE + 2 equal to (assuming hex values)?
1010 1011 1100 1111 1111 1110 0000 0000 0000 0010
What is 133AC + AC567 equal to (assuming hex values)?
0001 0011 0011 1010 1100 0000 0000 0000 1010 1100 0101 0110 0111
Question 2
[4 marks] Now let’s get some practice converting text to its hex equivalent value.
What is the ASCII representation in hex for the word Crime?
43 72 69 6d 65
What is the ASCII representation in hex for the word HACKER?
48 41 43 4b 45 52
What is the ASCII representation in hex for the phrase Good Luck?
47 6f 6f 64 20 4c 75 63 6b
What is the text message represented by the following hex digits?
4F 6E 63 65 20 55 70 6F 6E 20 41 20 54 69 6D 65
Once Upon A Time
Question 3
[7 marks] Let’s look at an old Roman age encryption scheme. Let’s say we intercepted a message
from a known Celtic hacker group. We know from experience that this group uses the characters
from A to Z, then a space, and then the numerals from 0 to 9 and employs a wrap around (moving
left from A gives us 9). The first leading pairs of letters tell us what the substitution code is using the code phrase “Trudy Jones”. For example if the first two pairs are uy du the code is 24 and 32. This would mean that we move the first 2 letters 4 places to the right eg. A becomes E), and then the next 3 letters 2 places to the left (eg. A becomes 8), then 4 places to the right for the next 2 characters and so on to encrypt the message.
a. What is the message hidden in du yd JQD8FQXFTCDLK? Remember that you’ll have to
reverse the algorithm (i.e. shift left first then right then left etc.) to decrypt the message.
LUZ AURANGZEB
b. The message is actually describing a fictional character. What would the encrypted name
of this character be using the same encryption scheme as the original message?
/MJ9kE1FOmH9uj5NANtrCKHMm7bytjlrBpOGrS8QNg4=
Question 4
[9 marks] Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this
system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate
the bits 8 positions to the left.
a. I will email you the key which is encoded within a spam email message. Once you receive
the email go to / and click on Decode. Cut and paste the body
of your email into the Decode window and get the key. The key will be 2 hex numerals. If
you don't get that when you decode the message, you haven't copied the e...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Organization And Management Of A Health Care FacilityDescription: With regards to the mission statement, the paper will place particular attention on its reason for existence. Lastly, the paper will discuss the correlation between the uses of technology as ways of improving patient services....1 page/≈275 words| 8 Sources | APA | Literature & Language | Term Paper |
- Life Cycle Nutrition Term Paper: Mother and InfantDescription: The nutritional status of a woman is not only crucial for her health but also for the development of the baby in the womb...4 pages/≈1100 words| 1 Source | APA | Literature & Language | Term Paper |
- Inquiry Based Learning Process And The Various Theories Associated With ItDescription: This paper aims at studying inquiry-based learning techniques that are employed by teachers. Different age groups of learning should be handled differently....13 pages/≈3575 words| 13 Sources | APA | Literature & Language | Term Paper |