Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Suppose we are using a method of encryption that does as much as possible to hide any patterns of a file, including symbol frequencies. And suppose we also want to compress the same file. In terms of the compression performance (the size of compressed file), is it better to compress the file before encrypting it, or encrypt the file before compressing it? Briefly explain the reason
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- The hacker group Desdeia tries to break our old weak cipher which we used for the communication with the Duchess of Ligovia. It's generally known that an actual breaking of the cipher needs the reviewing a huge amount of variants which probably lasts a couple of months. Additionally we know that the reviewing of different variants needs always the same server resource. Using our intelligence sources we tried to get some information about the actual progress of breaking, but we got only some fragments: • The hacker group Desdeia uses for breaking their powerful four-core server which resources are fully dedicated to breaking process. . The actual breaking process began exactly at noon, but we don't know, on which day. . By the noon of 2nd of April, already 648,467,673 variants were successfully reviewed. Exactly at this noon, when the breaking process was already lasted for 19 days, it was attempted to double the server speed. The doubling itself was failed, but instead of it there was…arrow_forward8. Also, in the Caesar cipher you could not encrypt two different letters to be the same letter (meaning if “p" → "S" then nothing else can go to “S"). Is this true of the Vigen'ere cipher too?arrow_forwardI need help with the following problems in cryptography. A. Encrypt the message “Freedom” using the Playfair matrix M F H I K U N O P Q Z V W X Y E L A R G D S T B C T B. Construct the Playfair matrix with the keyword “LARGEST” and encrypt the message “Freedom” again. C. Compare the results obtained in A and B. How do you account for these results?arrow_forward
- - Let's assume that a system can handle 2,000 users. a UNIX security system that permits 1,990 users to view a single file called "MPX.pdf" is suggested. Do you have any plans for the other ten people who don't have access to the file?arrow_forwardGet an understanding of the distinction between encoding and encryption.arrow_forwardConsider the affine cipher f(p) = 3p+4 (mod 26), where p is the plaintext representation of the character under consideration. For example the plaintext of the letter A is 0, B is 1, C is 2, ... Z is 25. Use this cipher to encrypt the letters I, N, G, R (changing the numbers back to letters at the end.arrow_forward
- Encrypt the first 4 letters of your last name as a block of data to be encrypted. (Let A=1, B=2, C=3,...Z=26). Decrypt the encrypted number to demonstrate that your system works. lastname is johnarrow_forwardSuppose you have a 100GB database housed on a disk array that supports a transfer rate of 60MBps and a tape drive that supports 200GB cartridges with a transfer rate of 80MBps. How long will it take to back up the database? What is the transfer time if 2:1 compression is possible?arrow_forwardConsider a very simple symmetric block encryption algorithm in which 32-bits blocks of plaintext are encrypted using a 64-bit key. Encryption is defined as C = (PK₁) K₁ where C = ciphertext, K = secret key, Ko = leftmost 64 bits of K, K₁ = rightmost 64 bits of K,+ = bitwise exclusive OR, and is addition mod 264. a. Show the decryption equation. That is, show the equation for P as a function of C, Ko, and K₁. b. Suppose and adversary has access to two sets of plaintexts and their correspond- ing ciphertexts and wishes to determine K. We have the two equations: C = (PK) K₁; C = (PK) K₁ First, derive an equation in one unknown (e.g., Ko). Is it possible to proceed fur- ther to solve for Ko?arrow_forward
- A.Given p=25, q=9, and e=7, generate the public key (n,e) and the private key (n,d) using the RSA Key generation algorithm. (Use Excel for computations) b. Given Bob's public key of (85, 7) and private key of (85, 55), show how Alice can encrypt m=3 to send to Bob. Show the ciphertext. c. Given Bob's public key of (85, 7) and private key of (85, 55), show how Bob can decrypt the ciphertext y=2 received from Alice. Show the plaintext. d. Using the fast exponentiation method, determine 530 mod 47. Show your work.arrow_forwardAn early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight characters long and were taken from the character set consisting of lowercase letters and digits. They were generated by a pseudorandom number generator with 215 possible starting values. Using the technology of the time, the time required to search through all character strings of length 8 from a 36-character alphabet was 112 years. Unfortunately, this is not a true reflection of the actual security of the system. Explain the problem.arrow_forwardIn this problem we explore the relationship between password length and cryptographic security. Suppose a password consists of 77 ASCII characters. You can review the ASCII characters here.. Exactly 27=12827=128 of these codes are for printable characters; we will assume every character in the password is printable. What is the size of the keyspace that consists of passwords of this form?What is the equivalent key length in bits? Assuming that you could check one password every 10−810−8 seconds, what is the worst case running time for cracking this password by brute force search (in days)? Now assume that the user used only 3131 characters from the keyboard. What is the key length in bits in this case? How many days, in the worst case, would it take to break this weaker password? You can't round to the nearest day here -- be as exact as possible. Supposing you used only 3131 characters, how long is the shortest password that achieves 252252 bits of security?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education