This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Section 5: Midterm Review: 1: What is the creature pictured below? 2. Encode the message from the picture above using a rail-fence cipher. 3. What is the difference between a Caesar Shift Cipher and a Monoalphabetic Substitution Cipher with a Keyword? 4. What is a code? What is a Nomenclator? How are they related? 5. Describe a Book Cipher. 6. How would you go about breaking a Vigenère cipher? 7. Draw the mappings for a Monoalphabetic Substitution Cipher, a Monoalphabetic Substitution Cipher with Homophones, and a Polyalphabetic Cipher: 8. Convert the following decimal numbers into binary: i) 99 = ii) 203 = iii) 55 = 9. Convert the following binary numbers into decimal: i) 11111110111 = ii) 1111010101 = iii) 12111111 = 10. Do the following binary operations: 11111011111101 111 + 11111101101101 x 11 11. Binary Transposition Cipher: Encipher the following message by swapping the first and second, third and fourth, fifth and sixth, and seventh and eighth digits: 10101101 ____________________________...
View Full Document
This note was uploaded on 09/15/2011 for the course LIGN 17 taught by Professor Kehler during the Winter '08 term at UCSD.
- Winter '08