Describe how bob can recover the message

Assignment Help Computer Network Security
Reference no: EM13657173

Question 1: Alice and bob agree to communicate privately via e-mail using a scheme based on RC4 but they want to avoid using a new secret key for each transmission. Alice and bob privately agree on 128-bit key k. To encrypt a message m consisting of a string of bits, the following procedure is used.

1. Choose a random 80- bit value v

2. Generate the ciphertext c = RC4(v||k)⊕m

3. Send the bit string(v||c)
a. Suppose Alice uses this procedure to send a message m to Bob. Describe how Bob can recover the message m from (v ll c) using k.
b. If an adversary observes several values (V1 ||C1), (V2, C2).......transmitted be-tween Alice and Bob. how can he or she determine when the same key stream has been used to encrypt two messages?

Question 2:  With the ECB mode. if there is an error in a block of the transmitted ciphertext, only the corresponding plaintext block is affected. However, in the CBC mode, this error propagates. For example. an error in the transmitted C1 (Figure 2.9) obviously cor¬rupts P1 and P2.

a. Are any blocks beyond P2 affected?

b. Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

Reference no: EM13657173

Questions Cloud

Profit assembly paint inspection : Profit Assembly Paint Inspection
What is his annual inventory turns : What is his annual inventory turns?
What lens must be used to see clearly an object at infinity : The near point of a certain eye is 100 cm in front of the eye. What lens must be used to see clearly an object 25 cm in front of the eye? The far point of a certain eye is 1 m in front of the eye. What lens must be used to see clearly an object at in..
Minimize the advertising budget : Minimize the advertising budget.
Describe how bob can recover the message : Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?
The limits of the visible spectrum : The limits of the visible spectrum are about 400 nm to 700 nm. Find the angular breadth of the first order visible spectrum produced by a plane grating having 15,000 lines per inch, when light is incident generally on the grating.(1inch = 2.54 cm)
Decide the angular speed of the wheel : An automobile tire has a radius of 0.380 m, and its center moves forward with a linear speed of v = 18.0 m/s. Decide the angular speed of the wheel.(Assume that there is no slipping of the surfaces in contact during the rolling motion.)
What are some major capacity issues in a hospital? : What are some major capacity issues in a hospital?
What is the ratio of potential energy to kinetic energy : What is the ratio of potential energy to kinetic energy for a comet that has now enough energy to escape from the Sun's gravitational field?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  Discuss any threats to priva

Companies would share. sign-on Information for any Weh user Mb 0 agree to participate. They would also share personal Information such as call card dela, billing addresses, and personal preferences.

  Explaining organization-s security architecture

Consider your organization's security architecture. How much do you know about it? How much do other workers know? How easy is it to learn more?

  Udp programs allowing two parties to establish a secure

Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Analyze ings solution for providing security to determine

write a three to four page paper in which youassess the probable difficulties and risks associated with using a public

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd