6. If t-butyl bromide was used as a substrate instead of t-butyl chloride the reaction rate would stay the same. The mechanism will still be SN1 reaction for the same reasons as t-butyl chloride. Such as, t-butyl bromide is tertiary alkyl halide like t-butyl chloride which will also favors SN1 reaction when reacted with water, a weak nucleophile. It will also form 30 carbocation which are more stable in SN1 reaction mechanisms as having more R groups (CH3 in this experiment) on the carbon with…
Interaction of concentrated nitric acid and sulfuric acid generated nitronium ion which is electrophile. And methyl benzoate nitration is one of electrophilic aromatic substitution. Nitronium ion will reacts with protonated intermediate at the meta position. After NO2 substituted, it becomes arenium ion intermediate. Then, the remained product HSO4- will attack hydrogen then transfer the proton to methyl 3-benzoate. In the experiment, students placed around 12 drops of concentrated H2SO4 in…
The goal of this lab was to prepare methyl m-nitrobenzoate using electrophilic aromatic substitution. An example of electrophilic aromatic substitution is nitration where a hydrogen atom which is part of a aromatic ring is substituted by an electrophile. For benzene, aromaticity is a stabilizing feature. As such, instead of undergoing electrophilic additions, it undergoes electrophilic substitutions. The nitronium ion is the electrophile which gets attached to the electron rich aromatic…
concepts behind electrophilic aromatic substitution. As the term states, the experiments deal with the chemistry of six membered ring compounds and their transformations through electrophilic substitutions. This type of reaction transforms the aromatic compound by allowing various functional groups to be attached to it. The general process of this reaction is a hydrogen on an aromatic ring, most simply an arene, being replaced by an electrophile. The substitution sometimes requires the…
This experiment was performed in order to demonstrate the principles of nitration through electrophilic aromatic substitution. It also examined the effects of bromine on an aromatic ring, ortho-para vs. meso directing. The second experiment was performed to compare the reaction rates of electrophilic aromatic bromination with different arenes. Data and Results In the gas chromatogram, there are two large peaks. The first peak at 0.653 minutes with an area of 133,352 uV per second, 31.95% of…
message as there was "no fully developed code of hieroglyphic substitution" according to Kahn. However, his actions, perhaps intended to add dignity to the carvings, had another effect - an essential ingredient of cryptography, the deliberate transformation of a message.…
been introduced to the world, yet only a few have stood out, testing the brains of some of the greatest hackers in the world to the limit. A notable example of a common code includes the pigpen cipher, which exchanges letters for symbols, featured as fragments of a grid. An additional example is the Caesar cipher,…
security via an open sea. The communication channel between the secure environments is unsecure. The security goals can be met from time to time using encryption. There are three main types of classical encryption methods or ciphers: transposition, substitution and product ciphers. One of the well known and most widely used asymmetric encryption methods is RSA algorithm. Another technology for hiding data within the contents is ‘Digital Watermarking’. Traditional watermarks may be applied to…
half of the state bits, and the full diffusion can be achieved only after three rounds. In practice, this code generally takes four or more. 2. In order to attack the NTH +1 or n+2 rounds of the password, believe the password analysis, the difference cipher analysis and the truncation analysis attack usually adopt a propagation path up to n wheel. The same is true of infiltration attacks, which use a four-wheel communication structure to attack six rounds. In this respect, we increase the four…
to imitate the Enigma with the bombe. Poland shared the bombe with the British and French on July 1939. This resulted in the British bombe which worked like 36 Enigma machines linked and operating in reverse. To track possible letter pairings of cipher and plain text, Bletchley technicians wired drums, or commutators, to spin at high speed,…