Modify the algorithm to rectify the above problem

Assignment Help Basic Computer Science
Reference no: EM13298031

3. Consider a simple symmetric encryption algorithm as follows:   
1- Input text T and 64 bit key K
2- Divide T into 64 bit size blocks B1...Bn
3- Get first block B1 and perform bit-wise XOR with K to
produce encrypted block E1
4- Repeat
a. Get next block Bi and perform bit-wise XOR with Ei-1
to produce encrypted block Ei
5- Until End of Text
Page 3 of 4
The algorithm is very simple, and naturally, we do not expect the ciphertext to be
cryptographically strong. Given the above algorithm answer the following:
a. Is it a problem if the first block of input happens to be the same as the key?
Explain why?  
b. Modify the algorithm to rectify the above problem.

Reference no: EM13298031

Questions Cloud

Needs to manage its telecommunications costs more effective : The retail store knows that it needs to manage its telecommunications costs more effectively. Based on the owner's goals to maximize the Internet for this purpose, provide a solution that will support the telecommunications (phone and fax) nee..
What is the moment of inertia of the merry-go-round : The radius of a park merry-go-round is 2.4 m. To start it rotating, you wrap a rope around it and pull with a force of 260 N for 11 s. What is the moment of inertia of the merry-go-round
What caused your perception to change : What is a perception you have had of another culture that has changed? What caused your perception to change? How might values of different peoples become more alike the more they interact with one another?
How to calculate the concentration of h3o+ of the solution : A 0.010 M HCN solution is .020% ionized. Calculate the concentration of H3O+ of this solution. Please show work and solution.
Modify the algorithm to rectify the above problem : Modify the algorithm to rectify the above problem.
What is global income in 2010 : Suppose that they have no other income, interest expenses are unchanged, and taxes are the same percentage of pretax income as in 2009.
Define flow at a hydraulic jump in terms of flow : Define flow at a hydraulic jump (upstream and downstream) in terms of the types of flow and corresponding Froude number. What is the depth of water at each section (upstream and downstream) compared to critical depth
How large a check could be written without it bouncing : At the present time, how large a check could be written without it bouncing? Round your answer to the nearest hundredth of million, if necessary.
Explain single carbon-carbon bonds represent potential : The polyyne molecules CkH2 with alternating triple and single carbon-carbon bonds represent potential nanowires for molecular electronics. They can be modelled as linear 1D-boxes with 2k

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Manufacturer of fine cosmetic soap products

Handcrafted Soap is a manufacturer of fine cosmetic soap products. Sweet Treats' two main products are soap and cleanser. Each batch of soap consumes 50 pounds of glycerin and 30 pounds of oil. Each batch of cleanse consumes 20 pounds of glycerin and..

  What is the purpose of the finally block

How does a method declare that it can throw an exception? How does it actually throw an exception? Use Java code to illustrate your answer.

  Explaining statement for security policy

Write a statement for security policy for the following:Let LAN for small 100-person business, Pixel Inc. Business occupies one floor in office building. Everybody has a computer on his or her desk.

  Write a method that returns index of the smallest element

Write a method that returns the index of the smallest element in an array of integers

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

  Give remediation recommendation for potential vulnerability

Provide a remediation recommendation for a potential vulnerability found with the use of the "eval" function in a static analysis report.

  Design a program that ask for the price of each item

Design a program that ask for the price of each item, and then displays the subtotal of the sale, the amount of sales tax and the total. Assume the sales tax is 6 percent. Need help with this question.

  Components of computer system interact within system

How do the components of your computer system interact within the system? What improvements or additions to your system do you think would benefit you or make the system more user-friendly? Why?

  Give an example of an array and how it could be used

Give an example of an Array and how it could be used

  Explaining kind of malicious software

What kind of malicious software is this? if username and password are valid return ALLOW_LOGIN else return DENY_LOGIN.

  Impact of activities called ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what the impact of these activities might be on your company.

  Explain object-oriented analysis and agile methodologies

Distinguish the object-oriented analysis and create models with structured analysis and design models. Write down Agile Methodologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd