Compare and contrast stream and block ciphers

Assignment Help Data Structure & Algorithms
Reference no: EM132267637

Question 1. Substantiate or refute the following statement: The cryptographic basis of the Enigma machine is transposition.

Question 2. As time goes on, the size (i.e., length) of cryptographic keys tends to increase. Why is this so?

Question 3. Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,... , pn} and corresponding cipher text = {c1, c2,... , cn}. Suppose the encryption function is ci = pi + 10 (mod 26). You receive the cipher text message
EWEM SC K QBOKD CMRYYV. What are the decryption function and the recovered plaintext? What type of cipher is this? What are some weaknesses of this cipher?

Question 4. Briefly compare and contrast stream and block ciphers.

Question 5. Consider the following plaintext message: WATER BOILS AT 212 DEGREES FAHRENHEIT
a. If this message is sent unencrypted and successfully received, what is its entropy?
b. If this message is encrypted with 3DES (using an optimal set of keys) what is the encrypted message's entropy?
c. If this message is encrypted with AES (using the most secure key length), what is the encrypted message's entropy?

Question 6. Name some risks that cannot be mitigated with cryptographic techniques.

Question 7. An organization has 8 members. Using a symmetric cipher, it is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. How many unique keys are required?

Question 8. How many bits would need to be added to DES's key in order to double its average brute-force cracking time?

Question 9. In terms of entropy, what is the goal of cryptography?

Question 10. In order to minimize bandwidth transmission requirements, does it make more sense to compress a message before or after it is encrypted?

Question 11. Which has the larger number of possible keys: a simple (monoalphabetic) substitution cipher for the 26-letter English alphabet, or DES? Why is DES considered to be the better cipher? Show the reasoning behind your answer.

Question 12. A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital D, is XORed with the pseudorandom byte 10010101.
a. What is the cipher text (in binary form) generated by the encryption of the character D? (Please show your work.)
b. How is the plaintext for this encrypted D recovered? (Please show your work.)

Question 13. A hacker with access to a super computer using brute force is able to crack a 3DES message (using its most secure keying option) in 1 hour. How many hours will it take her to crack an AES message (that uses its most secure keying option)?

Question 14. Substantiate or refute the following: As the cipher text sample size becomes smaller, cryptanalysis becomes easier.

Question 15. The following cipher text is a monoalphabetic cipher:

ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ

Decrypt this message, and briefly describe your cryptanalysis methodology. In particular, list features of the cipher text that hindered or helped your decryption process.

Question 16. Non-repudiation and authentication are terms sometimes used interchangeably. Are they different? If so, how do they differ?

Question 17. Ciphers are broadly categorized as using transposition, substitution or trap-door functions. Please provide an example of each type of cipher.

Question 18. Why wasn't John von Neumann a proponent for using pseudorandom number generators for use in stream ciphers?

Question 19. How many different possible substitutions are there for a simple Caesar cipher?

Question 20. What is a known weakness of Enigma ciphers

Question 21. A cipher that uses a one-time pad is considered unbreakable. If this is the case, why aren't one-time pads more widely used?

Question 22. Other than brute-force, what other cryptanalysis tools are commonly used to crack encrypted messages.

Question 23. What CAIN cryptographic services do each of the following provide: (1 point each)
a. Symmetric ciphers
b. Asymmetric ciphers
c. Hashing functions
d. Steganography

Question 24. The development of AES was done in a completely open manner, including detailed information regarding the algorithm used for the cipher. Was this a good idea? Why or why not?

Question 25. Fill in the blank: A ____requires that the cipher alphabet changes throughout the encryption process.
a. monoalphabetic substitution cipher
a. polyalphabetic substitution cipher
b. quantum cipher
c. alphanumeric shift cipher

Verified Expert

The assignment is about the test of Cryptology and Data Protection consisting of Twenty- Five different questions. All the questions have been attempted and answered with the good grammar and right punctuation.

Reference no: EM132267637

Questions Cloud

Resources become scarce : Imagine your are managing the production of a website. Half way through the project, resources become scarce, and balancing is required.
Possible for a project : Is it possible for a project to have more than one critical path? If so, under what circumstances could it happen, and what does it mean to the project manager?
Enterprise risk management program at mars incorporated : What represents the key success factors of the Enterprise Risk Management program at Mars Incorporated?
What is scope of a project : What headings are covered in that. Do we need to cover goals, deliverable, features, price and project task. What points are covered in each heading.
Compare and contrast stream and block ciphers : INFA640 - Cryptology and Data Protection - University of Maryland University College - Briefly compare and contrast stream and block ciphers
Continuing in a silo mentality : How do you succeed in making sure that the risk committee really turns into an ERM champion, as opposed to continuing in a silo mentality?
Information about a small project : Question: Given the following information about a small project,
Accomplished and the work environment : How does the project team match the work to be accomplished and the work environment?
Are normalized databases in general faster : Are normalized databases in general faster, slower, or exhibit about the same performance as non-normalized databases? Why?

Reviews

inf2267637

8/29/2019 3:31:09 AM

Splendid job done. I am surprised to see how well the writer has provided his discussion in given facts. All in all good work is delivered to me thanks a lot.

len2267637

3/27/2019 3:58:56 AM

The report should exhibit graduate-level writing, in terms of grammar, punctuation, format, quality of analysis, coherence, insight, logical flow, and reasoning. The paper is NOT an essay, it is to be a research report based fully on facts and data derived from appropriate sources in the literature. Provide a reference citation for EVERY statement of fact you include in your paper. Do NOT string together direct quotes from reference sources to create a narrative in the report. plagiarism report needed

len2267637

3/27/2019 3:53:03 AM

When composing your answers, be thorough. Do not simply examine one alternative if two or more alternatives exist. The more complete your answer, the higher your score will be. Be sure to identify any assumptions you are making in developing your answers, and describe how your answer would change if the assumptions were different. While composing your answers, be VERY careful to cite your sources. It is easy to get sloppy and forget to cite a source. Remember, failure to cite sources constitutes an academic integrity violation.

len2267637

3/27/2019 3:52:57 AM

You are to take this test during the week of. Work alone. You may not confer with other class members, or anyone else, directly or by e-mail or otherwise, regarding the questions, issues or your answers. You may use your notes, textbooks, other published materials, the LEO site for the class, and the Internet. The test is worth 25% of your grade for the course. It is scored on the basis of 100 points for the test.

Write a Review

Data Structure & Algorithms Questions & Answers

  Conversion with unnormalized relation

Nazca Cinemas is a tiny movie theater that would like you to create a movie scheduling database system for them. The theater has 4-screens. Each screens has its own unique ID

  Create an entity relationship diagram

you need to create an Entity Relationship (ER) diagram relevant to the above case study and perform logical design to produce appropriate 3NF Relations

  Implement bellman ford algorithm

Implement Bellman Ford Algorithm. Find an application that can best be solved by bellman ford algorithm.

  Implementing an item-based recommendation system

CSC385 Data Structures and Algorithms Project. For the semester project, you will be implementing an item-based recommendation system. Recommendation systems are widely used on the web for recommending products and services to users based on their ..

  Construct a process-flow diagram

Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphica..

  Draw the graphic for the healthy set

Draw the graphic for the healthy set, representing the values, healthy and unhealthy - What is the degree of membership to the fuzzy set healthy of person B who has a BMI of 26.2? And to the fuzzy set unhealthy?

  Find the median of all 2n elements in arrays x and y

Give an O(lg n)-time algorithm to find the median of all 2n elements in arrays X and Y.

  Write a method in linked list class to do the cut and paste

Write a method in the Linked List class to do the cut and paste. What is the running time of the algorithm?

  Define the inductive definition of a rooted tree

Use the inductive definition of a rooted tree (r-tree) given at the end of the section to prove once again that a rooted tree with n vertices.

  Creating entity-relationship model

The manager for the Clearwater Traders wishes to collect the following information for each order placed by a consumer: consumer's name and address, item's size or color if applicable and the retail price of each item.

  Discuss the charecteristics of good algorithm

Discuss the charecteristics of good algorithm

  Communicationa significant distinction between online and

communicationa significant distinction between online and face-to-face classes lies in the area of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd