Show the brute-force attack against single des

Assignment Help Data Structure & Algorithms
Reference no: EM13713923

Question -his is your chance to break a cryptosystem. As we know by now, cryptography is a tricky business.

The subsequent problem illustrates how easy it is to turn a strong scheme into a weak one with minor modifications.

We saw in this chapter that key whitening is a good technique for strengthening block ciphers against brute-force attacks.

We now look at the given variant of key whitening against DES, which we'll call DESA:

DESAk,k1 (x) = DESk(x) XOR k1.

Even though the method looks similar to key whitening, it hardly adds to the security.

Your task is to show that breaking the scheme is approximately as difficult as a brute-force attack against single DES. Assume you have a few pairs of plaintext-ciphertext.

Solve this question and provide the answer as soon as possible.

Reference no: EM13713923

Questions Cloud

A current passed through a sn(no3)2 solution : A current of 5.63 A is passed through a Sn(NO3)2 solution. How long (in hours) would this current have to be applied to plate out 8.20 g of tin
What role do personality : What role do personality, national culture, and organizational culture play in influencing an individual's ethics
Generate a main program which initializes : Generate a main program which initializes your data array to be sorted - be careful with your array index numbers. You can use a random number generator to generate entries for the array.
Determine the volume of the container after the h2 : At a fixed temperature, equal moles of H2 (g) and O2 (g) are mixed in a constant pressure container (the volume of the container changes in order to keep the pressure at a constant value). The H2 (g) and O2 (g) are allowed to react, producing H2O ..
Show the brute-force attack against single des : Your task is to show that breaking the scheme is approximately as difficult as a brute-force attack against single DES.
Define at what temperature of krypton occupy a volume : At what temperature (in oC) does 11.25 g of krypton occupy a volume of 5.44 L at a pressure of 1.07 atm? Report your answer to 3 significant figures and do not include units in your answer.
How is ethics and ethical behavior apparent : How is ethics and ethical behavior apparent in corporate culture. What is the relationship between law, values, and ethical behavior
Rsa with public - private key pair : RSA with three primes would also work: n = pqr, ?(n) = (p?1)(q?1)(r?1), gcd(e, ?(n)) = 1,
Explain what temperature of krypton occupy a volume : At what temperature (in oC) does 11.31 g of krypton occupy a volume of 9.66 L at a pressure of 1.91 atm

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Algorithm to minimize average difference between height

The problem is to assign each skier a ski to minimize the average difference between height of a skier and his/her ski. Give pseudocode and write its asymptotic running time.

  Database over electronic files to store data

Discuss the benefits of a database over electronic files to store data determine what kinds of database products are used in your company?

  How many different undirected graphs are there

How many different undirected graphs are there with V vertices and E edges (and no parallel edges)?

  Unctions for doing sort, search, display, replace, delete

create functions for doing sort, search, display, replace, delete, and add. You can use dynamic memory allocation for enlarge the size of pointer array for adding a new country.

  Describe how algorithm works for adjacency matrix

All vertices according to their type (head, neck, shoulder, hip, front foot or rear foot). Note that as adjacency matrix has n2 entries, you can't scan entire matrix in O(n) time. Describe how algorithm works.

  Making visual studio.net web application

Make a Visual Studio.NET 2005 web application with 2-aspx forms. Add a Menu control and a Label control to form. Populate the Menu control with data stored in the "Font" column and show your name in the Label control.

  What values will be in the registers after instruction

Calculate the average CPI for each machine, M1, and M2 - calculate the average MIPS ratings for each machine, M1 and M2 - What values will be in the registers after instruction is executed.

  Data structures for a single algorithm

Data structures for a single algorithm

  Creating an hierarchy chart

Regal Brakes Corporation requires to automate its payroll calculation system. To compute payroll, first the gross pay is calculated, which is equal to the item of the number of hours and hourly rates.

  Create a flowchart to determine the cause of problems

Assume you are the 1st level help desk technician at a average sized corporations. Your job is to handle the initial calls from corporation  computer users with personal computer related problems.

  Effective address-addressing mode of instruction is direct

Evaluate the effective address if the addressing mode of the instruction is (a) direct; (b) immediate; (c) relative; (d) register indirect.

  Creating two arrays of integers

Prepare two arrays of integers, each holding 10-elements of data. Make a third array of integers for a result array. The main program will take the 2-arrays of integers and pass them to the function subtract().

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd