What is the encryption algorithm how secure is


One way to solve the key distribution problem is to use a line from a book that both the sender and the receiver possess. Typically, at least in spy novels, the first sentence of a book serves as the key. The particular scheme discussed in this problem is from one of the best suspense novels involving secret codes, Talking to Strange Men, by Ruth Rendell. Work this problem without consulting that book! Consider the following message: SIDKHKDM AF HCRKIABIE SHIMC KD LFEAILA SHANNON.IR 2.7 / Key Terms, Review Questions, And Problems 57 This ciphertext was produced using the first sentence of The Other Side of Silence (a book about the spy Kim Philby): The snow lay thick on the steps and the snowflakes driven by the wind looked black in the headlights of the cars. A simple substitution cipher was used.

a. What is the encryption algorithm?

b. How secure is it?

Request for Solution File

Ask an Expert for Answer!!
Computer Networking: What is the encryption algorithm how secure is
Reference No:- TGS01368799

Expected delivery within 24 Hours