Substitution cipher

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 5 of 6 - About 56 Essays
  • Decent Essays

    6. If t-butyl bromide was used as a substrate instead of t-butyl chloride the reaction rate would stay the same. The mechanism will still be SN1 reaction for the same reasons as t-butyl chloride. Such as, t-butyl bromide is tertiary alkyl halide like t-butyl chloride which will also favors SN1 reaction when reacted with water, a weak nucleophile. It will also form 30 carbocation which are more stable in SN1 reaction mechanisms as having more R groups (CH3 in this experiment) on the carbon with…

    • 341 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Interaction of concentrated nitric acid and sulfuric acid generated nitronium ion which is electrophile. And methyl benzoate nitration is one of electrophilic aromatic substitution. Nitronium ion will reacts with protonated intermediate at the meta position. After NO2 substituted, it becomes arenium ion intermediate. Then, the remained product HSO4- will attack hydrogen then transfer the proton to methyl 3-benzoate. In the experiment, students placed around 12 drops of concentrated H2SO4 in…

    • 814 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The goal of this lab was to prepare methyl m-nitrobenzoate using electrophilic aromatic substitution. An example of electrophilic aromatic substitution is nitration where a hydrogen atom which is part of a aromatic ring is substituted by an electrophile. For benzene, aromaticity is a stabilizing feature. As such, instead of undergoing electrophilic additions, it undergoes electrophilic substitutions. The nitronium ion is the electrophile which gets attached to the electron rich aromatic…

    • 2313 Words
    • 10 Pages
    Improved Essays
  • Improved Essays

    concepts behind electrophilic aromatic substitution. As the term states, the experiments deal with the chemistry of six membered ring compounds and their transformations through electrophilic substitutions. This type of reaction transforms the aromatic compound by allowing various functional groups to be attached to it. The general process of this reaction is a hydrogen on an aromatic ring, most simply an arene, being replaced by an electrophile. The substitution sometimes requires the…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This experiment was performed in order to demonstrate the principles of nitration through electrophilic aromatic substitution. It also examined the effects of bromine on an aromatic ring, ortho-para vs. meso directing. The second experiment was performed to compare the reaction rates of electrophilic aromatic bromination with different arenes. Data and Results In the gas chromatogram, there are two large peaks. The first peak at 0.653 minutes with an area of 133,352 uV per second, 31.95% of…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    message as there was "no fully developed code of hieroglyphic substitution" according to Kahn. However, his actions, perhaps intended to add dignity to the carvings, had another effect - an essential ingredient of cryptography, the deliberate transformation of a message.…

    • 1174 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Gibberish Codes

    • 276 Words
    • 2 Pages

    been introduced to the world, yet only a few have stood out, testing the brains of some of the greatest hackers in the world to the limit. A notable example of a common code includes the pigpen cipher, which exchanges letters for symbols, featured as fragments of a grid. An additional example is the Caesar cipher,…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    security via an open sea. The communication channel between the secure environments is unsecure. The security goals can be met from time to time using encryption. There are three main types of classical encryption methods or ciphers: transposition, substitution and product ciphers. One of the well known and most widely used asymmetric encryption methods is RSA algorithm. Another technology for hiding data within the contents is ‘Digital Watermarking’. Traditional watermarks may be applied to…

    • 856 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Nt1310 Unit 1 Assignment 1

    • 1362 Words
    • 6 Pages

    half of the state bits, and the full diffusion can be achieved only after three rounds. In practice, this code generally takes four or more. 2. In order to attack the NTH +1 or n+2 rounds of the password, believe the password analysis, the difference cipher analysis and the truncation analysis attack usually adopt a propagation path up to n wheel. The same is true of infiltration attacks, which use a four-wheel communication structure to attack six rounds. In this respect, we increase the four…

    • 1362 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Codenamed Ultra Essay

    • 1114 Words
    • 5 Pages

    to imitate the Enigma with the bombe. Poland shared the bombe with the British and French on July 1939. This resulted in the British bombe which worked like 36 Enigma machines linked and operating in reverse. To track possible letter pairings of cipher and plain text, Bletchley technicians wired drums, or commutators, to spin at high speed,…

    • 1114 Words
    • 5 Pages
    Superior Essays
  • Page 1 2 3 4 5 6