Find first 20 bytes of the output of the rc4 algorithm

Assignment Help Computer Engineering
Reference no: EM131675822

Exercises

You must type your answers in a word processing system, and create a PDF.

You can work on your own, or you can work in pairs. If you work in a pair, only one of you should submit the answers (of course, both will get the credit). Please note on your answers that you worked as a pair, and please mention both IDnumbers.

1. Assume a simple two round Feistel block cipher with an 8 bit key and 16 bit block size. We have two rounds, with i = 0 and i = 1, and two round keys.

Theround keys are defined as Ki = K + 75 → i (mod256). The Feistel function is f(Ki, Ri) = 127? (Ki + Ri) (mod256), where Ri id the decimal representation of the right 8 bit sof the in put block.

Encrypt the message block M = (V, S) with key K = Y. Use the ASCII encoding of capital letters where A is encoded as 65. It is sufficient to give your result as apair of decimalnumbers.

2. For each of the following block ciphers E1and E2, explain whether the cipher is a secure pseudorandom permutation. (In both cases, the key size and the block size are 128bits.)
(a) E1(k, m) = km.
(b) E2(k, m) = (m - k mod 2128) k.

3. Compute the following:
(a) 1234567890 ?5678901234 mod 7890123456.
(b) (x2+ 1)(x3+ x + 1) mod x4+ x+1.

4. Let E be a secure block cipher (say, AES). Consider each of the following modes of operation. For each one, say whether it is secure or not, and briefly explain youranswer.

(a) Theen cryption by kof m1||m2||...||mnisc0||c1||c2||...||cn,wherec0 is a randomly chosen "initialisation vector" of appropriate size, and
ci= E(k, mi) ci-1(i>0).

(b) Theen cryption by kofm1||m2||...||mnisN||c1||c2||...||cn,whereN is a randomly chosen nonce of appropriate size, and ci= E(k,N mi).

5. Find the first 20 bytes of the output of the RC4 algorithm when run with the key K = [1,2,3].

Verified Expert

The solution file is prepared in ms word which solved cryptography problems. It has block cipher, ase , rc 4 algorithms problems and compute prime modulus for given number. The solution file also discussed about the different mode of operations in block cipher. All assignment questions are answered based on above topics.

Reference no: EM131675822

Questions Cloud

Aggregate of the virtual machines : Does this allow the aggregate of the virtual machines to perform more real work than a physical workload would be capable of on the same hardware?
Funds flow statement of money into and out of the country : BOP Accounting. If the BOP were viewed as an accounting statement, would it be a balance sheet of the country's wealth, an income statement of the country's.
Why should we look at the two essays together : Which essays have you chosen to compare? What do they have to say that you think is worthwhile and meaningful? Why should we look at the two essays together?
List and explain the six properties of ideal money : List and explain the six properties of ideal money, develop a new currency and banking system that works effectively at home and will be accepted by foreign
Find first 20 bytes of the output of the rc4 algorithm : Find the first 20 bytes of the output of the RC4 algorithm when run with the key - explain whether the cipher is a secure pseudorandom permutation
What makes you think that you are comfortable : Think of yourself as a consumer - what would you say is a good eCommerce website that you've used that you feel safe with but is not too cumbersome
Explain the goals and procedures for the quantitative method : Explain the goals and procedures for the quantitative and qualitative methods.What are the differences and commonalities of these methods?
Define the job of creating policies : Say the economy is in recession and you are the newly hired Federal director of fiscal policy and have been given the job of creating policies
Assessment of the prospects for the world economy : World Economic Outlook. The International Monetary Fund (IMF) regularly publishes its assessment of the prospects for the world economy.

Reviews

inf1675822

1/18/2018 4:50:52 AM

Without you guys, I'd actually be bombing in more than one aspects of my life. SO THANKFUL!! much thanks to you to boundlessness and past!

inf1675822

12/20/2017 4:47:16 AM

will this include the steps for each question or the answer only? can u please also try to provide us with the answer paper by Wednesday or early Thursday. appreciate to have reference link that used to solve the questions along with the explanation of step by step where will this be sent? here or to the email = We will send you an email and here to

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd