Draw a block diagram of the scheme

Assignment Help Basic Computer Science
Reference no: EM131329318

As is so often true in cryptography, it is easy to weaken a seemingly strong scheme by small modifications. Assume a variant of the OFB mode by which we only feed back the 8 most significant bits of the cipher output. We use AES and fill the remaining 120 input bits to the cipher with 0s.

1. Draw a block diagram of the scheme.

2. Why is this scheme weak if we encrypt moderately large blocks of plaintext, say 100 kByte? What is the maximum number of known plaintexts an attacker needs to completely break the scheme?

3. Let the feedback byte be denoted by FB. Does the scheme become cryptographically stronger if we feedback the 128-bit value FB,FB,...,FB to the input (i.e., we copy the feedback byte 16 times and use it as AES input)?

Reference no: EM131329318

Questions Cloud

Derive a simple formula for any arbitrary rsa modulus size : How many random odd integers do we have to test on average until we expect to find one that is a prime?
Project - hotel with restaurant that you are developing : You will use your own ideas and also take ideas from no fewer than three established hotels/restaurants to present your dream establishment.
Complete armando and gonzaless federal income tax return : Use the following information to complete Armando and Lourdes Gonzales's 2015 federal income tax return. Form 1040, Schedule A, Schedule B, Form 2106-EZ, Form 4562, Form 4562, Form 4797, Form 8863, and Form 8949.
What is the compound annual interest rate earned on the loan : What is the compound annual interest rate earned on the loan if the patient lives eighteen months? What if the patient lives just twelve months?
Draw a block diagram of the scheme : Let the feedback byte be denoted by FB. Does the scheme become cryptographically stronger if we feedback the 128-bit value FB,FB,...,FB to the input (i.e., we copy the feedback byte 16 times and use it as AES input)?
Which group dominated mexico from 900 to 1100 ce : In 1492, how many people lived on the continents of North and South America?Which group dominated Mexico from 900 to 1100 C.E.?Which of the following is an example of a "mound-building" society?Which religion took root in West Africa in the eleventh ..
Calculate the five year growth in sales and net income : Calculate the five-year growth in sales and net income and determine the compound annual growth rate for each company.
Do the images work together to form a coherent pattern : Do the images work together to form a coherent pattern - what ideas or feelings are conveyed by the images the author has selected and how do they contribute to the overall meaning of the poem?
Calculate the three year growth in stock price : Calculate the three-year growth in stock price and the compound annual growth rate in stock price for each company.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a report about popular erp system used

Write a minimum of three page research report about popular ERP system used by many organizations. Dynamics offer five primary products, each includes one or more model.

  Describe a file system

Theory-long answer question. Describe how a file system could be implemented using a collection of inodes and some variant of a B tree. 500-1000 words. Be sure to consider: unallocated space, bad allocations, lost and found, root directories, s..

  Expecting the user to input two variable values

A painting company has determined that for every 115 square feet of wall space, 1 gallon of pain and 8 hours of labor will be required. The company charges $20.00 per hour for labor. Create an application that allows the user to enter the square f..

  How should mike and iris proceed

If the Enterprise policy Review Committee is not open to the approach that Mike and Iris want to use for structuring InfoSec policies into three tiers, how should Mike and Iris proceed?

  Write a class for representing operations to be shipped

Write a class for representing operations to be shipped to another computer to execute there. Test it either by actually sending commands to another machine or by writing commands to a file and then executing the commands read from the file.

  The cpu fetch-execute cycle

A von Neumann machine has a random-access memory and each successive operation can read or write any memory location, independent of the location accessed by the previous operation and also has a CPU with one or more registers that hold data that are..

  File sharing on a local network

File Sharing on a Local Network

  Web-based airline reservation system

1. Update an airline reservation on a Web-based airline reservation system from a home computer

  What is the impact of such issues on the management of

evaluate and discuss the human resource security privacy and stability issues affected by information technology. the

  What is the surface area of the heat exchanger

A cross-flow heat exchanger used in a cardiopulmonary bypass procedure cools blood flowing at 5 liter/min from a body temperature of 37°C to 25°C in order to induce body hypothermia, which reduces metabolic and oxygen requirements.

  Assume you are the it manager for an organization tasked wit

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees. Discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and ris..

  What is the present worth of the savings to the utility

what is the present worth of the savings (in $/acre-ft) to the utility between the old and the new contracts? Let the interest rate equal 6% per year.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd