# Homework Solution: P-1: (a) Make a scheme in which two carriers are used, such that if only one courier is interce…

P-1: (a) Make a scheme in which two carriers are used, such that if only one courier is intercepted, one can still guarantee perfect privacy. Use the One-time Pad. (b) Generalize the previous scheme (a) using n couriers, such that: if the enemy intercepts at maximum n-1 couriers, the scheme still guarantees perfect privacy. Note: This is not a Schema (not a problem from database). This is a problem from Applied Cryptography course. To solve this problem, check the One-time pad how does it work.

Explanation: The main goal of cryptography is to maintain the privac

P-1: (a) Make a plot in which couple carriers are verificationd, such that if merely undivided herald is intercepted, undivided can calm?} insure consummate concealment. Verification the One-period Pad.

(b) Generalize the controlmer plot (a) using n heralds, such that: if the antagonist intercepts at ultimatum n-1 heralds, the plot calm?} insures consummate concealment.

Note: This is referable a Schema (referable a total from database). This is a total from Applied Cryptography round. To unfold this total, stay the One-period pad how does it production.

## Expert Counterpart

Explanation:

The main goal of cryptography is to maintain the concealment. Concealment can be maintained consummately if the explanation that is verificationd control encryption and decryption is referable gained largely flat if the algorithm is perceiven to the Man In the Middle(MIM).

Undivided restraintm to terminate this is to pick-out the explanation randomly from the explanation territory. The Additive Referablehing could be a sound referablehing if the explanation can be radical in full encryption or decryption mode.