midterm review

midterm review - Section 5: Midterm Review: 1: What is the...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Section 5: Midterm Review: 1: What is the creature pictured below? 2. Encode the message from the picture above using a rail-fence cipher. 3. What is the difference between a Caesar Shift Cipher and a Monoalphabetic Substitution Cipher with a Keyword? 4. What is a code? What is a Nomenclator? How are they related? 5. Describe a Book Cipher. 6. How would you go about breaking a Vigenère cipher? 7. Draw the mappings for a Monoalphabetic Substitution Cipher, a Monoalphabetic Substitution Cipher with Homophones, and a Polyalphabetic Cipher: 8. Convert the following decimal numbers into binary: i) 99 = ii) 203 = iii) 55 = 9. Convert the following binary numbers into decimal: i) 11111110111 = ii) 1111010101 = iii) 12111111 = 10. Do the following binary operations: 11111011111101 111 + 11111101101101 x 11 11. Binary Transposition Cipher: Encipher the following message by swapping the first and second, third and fourth, fifth and sixth, and seventh and eighth digits: 10101101 ____________________________...
View Full Document

This note was uploaded on 09/15/2011 for the course LIGN 17 taught by Professor Kehler during the Winter '08 term at UCSD.

Page1 / 5

midterm review - Section 5: Midterm Review: 1: What is the...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online