Explaining simple symmetric encryption algorithm

Assignment Help Data Structure & Algorithms
Reference no: EM1355789

Q1) Consider a simple symmetric encryption algorithm as follows:

1- Input text T and 64 bit key K

2- Divide T into 64 bit size blocks B1...Bn

3- Get first block B1 and perform bit-wise XOR with K to produce encrypted block E1

4- Repeat

a. Get next block Bi and perform bit-wise XOR with Ei-1 to produce encrypted block Ei

5- Until End of Text. The algorithm is very simple, and naturally, we do not expect the cyphertext to be cryptographically strong. Given the above algorithm answer the following:

(a) Is it a problem if the first block of input happens to be the same as the key? Explain why?

(b) Modify the algorithm to rectify the above problem.

Reference no: EM1355789

Questions Cloud

Informed consent and counsellor : What must be included in an informed consent form ethically? Why are counsellors required to have a written informed consent form? In what ways are both the counsellor and the client being protected by such a document?
Eight steps for accounting cycle : What are the eight steps in the accounting cycle and how do they affect the financial statements? What happens if one is missing?
Pension expense-journal entries : Compute pension expense and prepare the journal entry to record pension expense and the employer's contribution to the pension plan in 2010.
Compute the degree of financial leverage : Make a common size income statement for Dreamscape, Corporation for the year ended December 31, 2005. Evaluate the company's performance against industry average ratios and against last year's results.
Explaining simple symmetric encryption algorithm : Consider a simple symmetric encryption algorithm as follows:Is it a problem if the first block of input happens to be the same as the key? Explain why?
How much work has the electric field done on proton : In a head on collision, a car stops in .10 seconds from a speed of 14 meters per second. The driver has a mass of 70 kg, and is, fortunately, tightly strapped into his seat. What force is applied to driver by his seat belt during that fraction of ..
Accounts receivable-bad debt journal entries : Prepare example journal entries to account for transactions related to accounts receivable and bad debt using both percentage of sales and the percentage of receivables methods.
Illustrate what recieves goverment subsides : Illustrate what recieves goverment subsides that are in place to protect the population rather than for economic reasons.
Right of access to files : What should clients be told with respect to their right of access to files? Describe a counselling situation in which such rights might come into play. One reference of a valid article.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Algorithm to read arbitrary number of data records

Write the algorithm to read arbitrary number of data records, each comprising name, age, and code.

  C++ program to evaluate expressions combining set union

Create a C++ program to evaluate expressions combining set union, set intersection and parentheses

  Algorithm for string of numbers recognize all the substrings

Write down algorithm, using pseudocode, to perform the following task, Given a string of numbers, recognize all of the substrings that form numbers that are divisible by 3.

  Addition and subtraction of numbers in binary

Addition and Subtraction of numbers in binary and round to the nearest decimal number with three significant decimal digits

  Encryption feistel cipher and decryption algorithm

If this is psudocode for encryption feistel cipher determine decryption algorithm?Output: ciphertext = (left[16], right[16]) Explain pseudo-code of corresponding decryption algorithm for this cipher.

  Data structures for a single algorithm

Data structures for a single algorithm

  Demonstrate a decision tree or table

Demonstrate a decision tree or table

  Primitives-remove ambiguities in algorithm-s representation

Describe how the use of primitives helps remove ambiguities in an algorithm's representation.

  Determining entropy of encrypted message

If this message is encrypted with DES by using a random 56-bit key, determine encrypted message's entropy?

  Implementation of graph

Give the two input nodes after the graph has been built from the command prompt.

  Js code to prompt the user for integer and print result

Write JS code which prompt the user for an integer and prints the result.

  Explain solution to recurrence-appealing to recursion tree

Solve the following recurrence relations by the method of your choiceT(n) = 1 for n = 4 and T(n) =pnT(pn) + n for n > 4. Argue that the solution to the recurrence T(n) = T(n=3) + T(2n=3) + cn is (n lg n) by appealing to the recursion tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd