2) Suppose that the Notifier of an audit system has been configured to send an e-mail to the administrator(s) of the system when the Notifier believes it has been compromised. Describe two potential problems with this configuration.
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.1) E(x)=ax+b (mod 26)
Since affine is a linear mapping, it means that most frequent letters from the ciphertext correspond to most frequent letters from plaintext.
In English alphabet the most frequent letters are E and T; so E from plaintext is mapped by affine transformation into B in ciphertext and T from plaintext English is mapped by affine transformation into U in ciphertext....