Describe how bob can recover the message

Assignment Help Computer Network Security
Reference no: EM13657173

Question 1: Alice and bob agree to communicate privately via e-mail using a scheme based on RC4 but they want to avoid using a new secret key for each transmission. Alice and bob privately agree on 128-bit key k. To encrypt a message m consisting of a string of bits, the following procedure is used.

1. Choose a random 80- bit value v

2. Generate the ciphertext c = RC4(v||k)⊕m

3. Send the bit string(v||c)
a. Suppose Alice uses this procedure to send a message m to Bob. Describe how Bob can recover the message m from (v ll c) using k.
b. If an adversary observes several values (V1 ||C1), (V2, C2).......transmitted be-tween Alice and Bob. how can he or she determine when the same key stream has been used to encrypt two messages?

Question 2:  With the ECB mode. if there is an error in a block of the transmitted ciphertext, only the corresponding plaintext block is affected. However, in the CBC mode, this error propagates. For example. an error in the transmitted C1 (Figure 2.9) obviously cor¬rupts P1 and P2.

a. Are any blocks beyond P2 affected?

b. Suppose that there is a bit error in the source version of P1. Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

Reference no: EM13657173

Questions Cloud

Profit assembly paint inspection : Profit Assembly Paint Inspection
What is his annual inventory turns : What is his annual inventory turns?
What lens must be used to see clearly an object at infinity : The near point of a certain eye is 100 cm in front of the eye. What lens must be used to see clearly an object 25 cm in front of the eye? The far point of a certain eye is 1 m in front of the eye. What lens must be used to see clearly an object at in..
Minimize the advertising budget : Minimize the advertising budget.
Describe how bob can recover the message : Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?
The limits of the visible spectrum : The limits of the visible spectrum are about 400 nm to 700 nm. Find the angular breadth of the first order visible spectrum produced by a plane grating having 15,000 lines per inch, when light is incident generally on the grating.(1inch = 2.54 cm)
Decide the angular speed of the wheel : An automobile tire has a radius of 0.380 m, and its center moves forward with a linear speed of v = 18.0 m/s. Decide the angular speed of the wheel.(Assume that there is no slipping of the surfaces in contact during the rolling motion.)
What are some major capacity issues in a hospital? : What are some major capacity issues in a hospital?
What is the ratio of potential energy to kinetic energy : What is the ratio of potential energy to kinetic energy for a comet that has now enough energy to escape from the Sun's gravitational field?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd