Business Mathematics 1
Business Mathematics 1
Business Mathematics 1
10
2
= -p
x
2
For calculating marginal revenue first total revenue has to be calculated which is done by
calculating p with demand function i.e x
So
Total Revenue = px = (5 -
Total Revenue = 5x -
x
2
x
2 )x
*X
x
2
*X
Now we have to calculate Marginal Revenue which is find by derivating the equation so we get
Marginal Revenue =
d tr
dx
= 5-
2x
2
http://www.garykessler.net/library/iit.html
764
32
127
10
different ciphertext in a stream cipher. Stream ciphers come in several flavors but two are worth
mentioning here.
ciphers calculate each bit in the keystream as a function of the previous n bits in the keystream
the decryption process can stay synchronized with the encryption process merely by knowing how far into
the n -bit keystream it is.
error propagation; a garbled bit in transmission will result in n garbled bits at the receiving side.
Synchronous stream
keystream in a fashion independent of the message stream but by using the same keystream generation
function at sender and
ciphers do not propagate transmission errors, they are, by their nature, periodic so that the keystream will
eventually repeat. Block
operate in one of several modes; the following four are the most important: Electronic Codebook (ECB)
mode is the simplest,
application: the secret key is used to encrypt the plaintext block to form a ciphertext block. Two identical
plaintext blocks, then,
generate the same ciphertext block. Although this is the most common mode of block ciphers, it is
susceptible to a variety of brute-force
Cipher Block Chaining (CBC) mode adds a feedback mechanism to the encryption scheme. In CBC, the
plaintext is exclusively- ORed
previous ciphertext block prior to encryption. In this mode, two identical blocks of plaintext never encrypt
to the same
Feedback (CFB) mode is a block cipher implementation as a self-synchronizing stream cipher. CFB mode
allows data to be encrypted in units
than the block size, which might be useful in some applications such as encrypting interactive terminal
input. If we were using 1-byte CFB mode, for
example, each incoming character is placed into a shift register the same size as the block, encrypted,
and the block transmitted. At the receiving
side, the ciphertext is decrypted and the extra bits in the block (i.e., everything above and beyond the one
byte) are discarded.
OFB) mode is a block cipher implementation conceptually similar to a synchronous stream cipher. OFB
prevents the same plaintext
generating the same ciphertext block by using an internal feedback mechanism that is independent of
both the plaintext and
Secret key cryptography algorithms that are in use today include: DES : (Data Encryption Standard), was
the first encryption standard
recommended by NIST (National Institute of Standards and Technology). It is based on the IBM proposed
algorithm called Lucifer. DES became a standard
in 1974. Since that time, many attacks and methods recorded that exploit the weaknesses of DES, which
made it an insecure block cipher. 3DES:
enhancement of DES, the3DES (Triple DES) encryption standard was proposed. In this standard the
encryption method is similar to the one in original
DES but applied 3 times to increase the encryption level. But it is a known fact that 3DES is slower than
other block cipher methods.
Advanced Encryption Standard) , is the new encryption standard recommended by NIST to replace DES.
Rijndael (pronounced Rain
selected in 1997 after a competition to select the best encryption standard. Brute force attack is the only
effective attack known against it,
which the attacker tries to test all the characters combinations to unlock the encryption. Both AES and
DES are block ciphers. Blowfish: It is
of the most common public domain encryption algorithms provided by Bruce Schneier - one of the world's
leading cryptologists, and the
Counterpane Systems, a consulting firm specializing in cryptography and computer security. Blowfish is a
variable length key, 64-bit block cipher
The Blowfish algorithm was first introduced in 1993.This algorithm can be optimized in hardware
applications though it's mostly used in software
applications.