Compute the 16 bit hash for the 32 bit message

Assignment Help Computer Network Security
Reference no: EM131225485

Exercise Sheet

1. Let L be a 9 bit LFSR with connection polynomial c(x) = x8 + x4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystream, the feedback bits and show the intermediate states of the register.

2. Consider a modified version of the Cipher block chaining mode, where the initialisation vector is not chosen at random, but chosen randomly once (like the key) and then increased by one for each encryption. Show that this modified version is not IND-CPA-secure. Note that the initialisaton vector is always part of the ciphertext.

3. Perform hashing, with the second round of the MD4 hash function adapted as follows:

(H1, H2, H3, H4) := (A, B, C, D)

for i := 0 to 3 do

t := A + G(B, C, D) + Mi

(A, B, C, D) := (D, t << i, B, C)

end

(A, B, C, D) := (H1 + A, H2 + B, H3 + C, H4 + D)

Assume that we compute a 16 bit hash, i.e., A, B, C, D are 4 bit words, G takes three 4 bit arguments and the message blocks are 16 bits partitoned into 4 bit chunks. Addition is modulo 24. Initially let (A, B, C, D) = (0x2, 0x5, 0x9, 0xD).

Compute the 16 bit hash for the 32 bit message given as hexadecimal number 0xFAB1756E.

4. Compute a simplified PMAC as follows: Let n = 4 and use the field F2[x]/(x4 + x + 1). Define the encryption function E by E(K, M ) = K  ⊕ M . Choose K to be 0110 and L to be 1010 and form the hash of the message 11000011. Show the calculations.

Reference no: EM131225485

Questions Cloud

Determine the transresistance transfer function : Find (i) the quiescent drain current IDQ and (ii) the small-signal transistor parameters. - Determine the transresistance transfer function Az f = vo/is.
Write a query or queries to print the table description : Write a query or queries to print the table description and the contents of each table, and copy and paste the results to a file called sales. Write a 1- to 2-page paper describing each constraint you created and why it is necessary.
Firm-wide weighted average cost of capital : Suppose a firm has several divisions, each with a unique area of business. What role does the firm-wide weighted average cost of capital play when determining a project's cost of capital in a given division?
Discuss the special considerations for pitching a blogger : Describe your follow-up plan. Discuss the special considerations for pitching a blogger.
Compute the 16 bit hash for the 32 bit message : 06-20008 Cryptography - Compute the 16 bit hash for the 32 bit message given as hexadecimal number 0xFAB1756E and Show that this modified version is not IND-CPA-secure.
Create preventative control for sungrafix video game company : Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system.
Find the transresistance transfer function : Determine the quiescent values ICQ and VECQ. - Find the transresistance transfer function Azf = vo/is. - Determine the input resistance Rif.
Accommodating a client forward transaction : Banks find it necessary to accommodate their clients needs to buy or sell FX forward, in many instances for hedging purposes. How can the bank eliminate the currency exposure it has created for itself by accommodating a client's forward transacti..
Write a research paper on a wide area network : Assessing and securing systems on a wide area network (WAN). Research paper; Ten pages, however no more than fifteen pages, 12 point font, Times New Roman and double spaced.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Network security fundamentals

The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for..

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Discuss the major categories of information security control

Define and discuss the major categories of information security controls

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? What sort of people would go after this information? Why would they want it

  Problem regarding the risk assessment

Below is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram.

  What were the economic or political consequences

What were the economic or political consequences? How was the situation handled? How could enterprise-level network security planning and policies have helped to prevent this incident? Provide at least two specific examples.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  What are some future technology initiatives

Mobile Manufacturing Company includes all the aspects like collecting requirements, designing and manufacturing of various mobiles. What are some future technology initiatives? Does the organization tend to make, buy, or both? Why? How does the orga..

  How to use tools to evaluate best security mechanisms

How to use tools to evaluate best security mechanisms for dealing with internal and external threats Consolidate all sections of the paper

  Network security structure

After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability.

  Provide the ip address of the host used by the perpetrator

Provide the IP address of the host used by the perpetrator. Based on this information, what can you tell about the profile of this individual? Explain why.

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd