Write a one-page paper on hash functions and their purpose in modern cryptography. Describe how hash functions are used to detect message corruption and ensure message integrity. Discuss the significance. Make sure your response is accurate.
You have been selected to be the leader of a Secret Spy Team! As a mathematician in training, your expertise with functions will be helpful in securing top secret communications between your team members. Your team’s goals and objectives are to encode secret messages with details on your next team’s meeting. As Team Leader you are to help train the team to use functions to encode the messages making them unreadable to anyone outside of your team.
Each letter of the alphabet and a blank space can be represented as a two-digit number.
Numerical Look-Up Table:
A = 1
B = 2
D = 4
E = 5
F = 6
G = 7
H = 8
I = 9
J = 10
K = 11
L = 12
M = 13
N = 14
O = 15
P = 16
Q = 17
R = 18
T = 20
U = 21
V = 22
W = 23
X = 24
Y = 25
Z = 26
Space = 27
Pick an encoding/decoding pair of functions from the list of functions. These inverse functions are the keys to encoding and decoding your team’s messages.
Encoding A Message:
a) First part of message: Using your first name (Chris) and the Numerical Look-up Table (attached file) represent the following message numerically.
Then using your selected function, encode each numeric value to make a “secret” coded message!
b) Second part of message: Pick one of the following to coordinate your team’s secret meeting. Write a short message to the team of four words or less. Encode the message using the numerical lookup table and coding function.
Location: Decide on a location to meet. For example, MEET AT STARBUCKS
Where to Be: Decide where to be at the location. For example, SIT BY THE DOOR
Time: Decide on the time to meet. For Example, MEET AT NOON
What to Bring: Decide on what to bring. For example, BRING THE MAP
What to Wear: Decide on what each team member should wear. For example, WEAR A STOCKING CAP
What to Do: Decide on what to do at location. For example, BUY A COFFEE
Password to Say: Decide on password to say for meet up. For example, I LIKE TEA
Password to Reply: Decide on password to reply for meet up. For example, I PREFER SODA
c) Contribute to the team’s goal by sharing your encoded message (part one and part two) As the Team Leader, explain all steps to train your team for coding the secret meeting messages.
I would like to do my outline on Bitcoin. This assignment is for an informative speech. I have attached an example of what the out line must look like with sources.