• 100% Satisfaction Guarantee
Jess M., Computer Support Specialist
Category: Software
Satisfied Customers: 618
Experience:  Computer Software Support specialist for more that 10 years
49766785
Jess M. is online now

# Introduction to cryptography. the link has the questions and

### Customer Question

introduction to cryptography. the link has the questions and details
Submitted: 11 months ago.
Category: Software
Expert:  Tim replied 11 months ago.

Hey there, I'm Tim and will need access granted to see what this doc is, i'm assuming its homework?

Customer: replied 11 months ago.

Expert:  Tim replied 11 months ago.

Gotcha man, I'm going to pass on this one and open up the question to others.

Customer: replied 11 months ago.

Expert:  Bhavik Joshi replied 11 months ago.

Expert:  Bhavik Joshi replied 11 months ago.

By when do you need it ?

Customer: replied 11 months ago.

Two days from now

Expert:  Bhavik Joshi replied 11 months ago.

Alright !! Hopefully I will be able to complete it by then.

Customer: replied 11 months ago.

Thank you for responding. Have you looked into the questions?

Expert:  Bhavik Joshi replied 11 months ago.

Hi, Yes I looked into it but I am not yet done.

Expert:  Bhavik Joshi replied 11 months ago.

I am sorry, I could not get the expected result of your first 2 question. I answered your last question in it. I am opting out so that other experts can reply to you.

Expert:  Bruce Wilner replied 11 months ago.

Hi. I would be happy to help you. Among other things, I am a former professor of EE and comp E.

Is that all the information you have to complete the assignment?

Customer: replied 11 months ago.

Yup that is it

Expert:  Bruce Wilner replied 11 months ago.

Sixteen iterations are required for problem 1, and more than that for problem 2. This is a lot more effort than you may have imagined.

As for the proposed answer to problem 3, it is correct for the asymmetric case but NOT NECESSARILY CORRECT for the symmetric case. The answer for the latter depends upon how the cryptosystem is set up. If if is end-to-end, there are 20 x 19 possible ordered pairs of communicants, so the number of underordered pairs is indeed 190. In other cases, the answer differs.

Customer: replied 11 months ago.