Reference no: EM132103859
Problem : Lem E. Tweakit is an aspiring embedded systems developer. Recall that RC4's internal state consists of an "S-Box" (S[]) and two pointers (i and j).
Lem, constrained by hardware, wants to implement the swap(S[i], S[j]) operation from RC4's Pseudo-Random Generation Algorithm (PRGA) without using a temporary variable. To perform the swap, Lem's PRGA uses the following algorithm:
Algorithm 1 LEM-SWAP(x, y)
1: x = x ? y
2: y = x ? y
3: y = x ? y
4: x = x ? y
Alyssa P. Hacker, who studied the RC4 stream cipher in CS4538, is concerned. In particular, Alyssa argues that his implementation exhibits a weakness that will compromise the privacy of data encrypted using his implementation of the RC4 PRGA.
(a) Alyssa is correct. Why? Explain your answer, providing a proof if necessary.
(b) Fix Lem's PRGA implementation by fixing LEM-SWAP(). Without using a temporary variable, provide the corrected LEM-SWAP() and show its correctness.
Having fixed LEM-SWAP(), Alyssa digs deeper into Lem's implementation. She notices another oddity: to save state space, his S-Box is an identity permutation of 128 elements (half the size of traditional RC4)! All KSA and PRGA operations are otherwise the same, but modulo 128.
(c) How will Lem's use of a 128 element S-Box affect the security of the resulting ciphertext? Explain your answer.
What is the protein sequence encoded by the gene
: Which region of the mRNA do you think can be translated into a protein (hint: Can you identify the start codon and stop codon from the mRNA sequence?)
|
How many cycles does this code take to complete
: Show a pipeline execution diagram for the program by inserting nop instructions to eliminate the data hazard.
|
Print the keys as encountered in a preorder traversal
: Consider a binary (min)heap. We have a method that prints the keys as encountered in a preorder traversal.
|
Identify a superkey for the book entity set
: Consider the entity set 'Book' with the attributes 'title', 'author', 'publisher', 'pubDate', 'numberPages', 'condition', 'cost', and 'datePurchased'.
|
Discuss about the pseudo-random generation algorithm
: Fix Lem's PRGA implementation by fixing LEM-SWAP(). Without using a temporary variable, provide the corrected LEM-SWAP() and show its correctness.
|
How social capital enhance well-being
: How Social Capital enhance well-being in high density community?
|
List all files in the current directory in order of used
: Give a single command (any commands separated by pipes are considered to be a single command) for each of the following.
|
What are the key planning and preparation tasks
: To accomplish this task, what are the key planning and preparation (analysis/design) tasks that must be completed to successfully meet this challenge?
|
Write a java method is primenum that takes the number n
: Write a java method is PrimeNum that takes the number n, and checks whether the number is prime or composite.
|