1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y
2.Decrypt this cipher text into a binary string: 106
3.Now that you can see how public and private keys work in a real-world scenario, write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.