Why not allow zero bytes of padding

Assignment Help Computer Network Security
Reference no: EM131827605

Problem

CBC-Pad is a block cipher mode of operation used in the RC5 block cipher, but it could be used in any block cipher. CBC-Pad handles plaintext of any length. The ciphertext is longer then the plaintext by at most the size of a single block. Padding is used to assure that the plaintext input is a multiple of the block length. It is assumed that the original plaintext is an integer number of bytes. This plaintext is padded at the end by from 1 to bb bytes, where bb equals the block size in bytes. The pad bytes are all the same and set to a byte that represents the number of bytes of padding. For example, if there are 8 bytes of padding, each byte has the bit pattern 00001000. Why not allow zero bytes of padding? That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

Reference no: EM131827605

Questions Cloud

How much information is represented by the state : How many bits are used? Suppose we think of it from the point of view of how much information is represented by the state.
Paraphrasing and direct quotations : Kinesiologist Christy Lotz, Michael Agnew, Alison Godwin and Joan Stevenson (2009) explains that "Prior to the release of back belts for use in industry
Analyze the effect of full and variable-cost transfer method : Required: Analyze the effect of full-cost and variable-cost transfer pricing methods on Phipps' cash flows
Comment on paraphrasing and direct quotations : This is my interpretation of the sandwich method which the required reading stated as a very simplistic and effective way to properly present outside.
Why not allow zero bytes of padding : Why not allow zero bytes of padding? That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?
Reading and writing are skills that are connected : Reading and writing are skills that are connected. Discuss why you believe these skills are important and whether or not you believe
Discuss the security implications of such centralization : Key distribution schemes using access control center and key distribution center have central points. Discuss the security implications of such centralization.
Describe a strategic direction that the company is pursuing : Write a brief company history, including a mission statement. Describe a strategic direction that the company is pursuing.
Determining the detriment of a company : NOTE: Keep in mind that "too dependent" indicates relying too much on technology, i.e. to the detriment of a company.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Determine what the risk to an organisation

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles.

  Explain aes algorithms that implement symmetric cryptography

Decription of AES algorithms that implement symmetric cryptography and strenghts and weekness of algorithm.

  Analyze proper physical access control safeguards and

imagine you are an information security consultant for a small doctors office consisting of three 3 doctors two 2

  What are critical points in determining intention of sandra

Explain what MBT and Sandra could have done to protect against controversy arising - what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra?..

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to company users.

  Briefly analyse the candidates - mac, dac and rbac

Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on the application requirements.

  Analyze considerations for performing risk analysis

Analyze some of the possible additional considerations that may be necessary for performing risk analysis on critical infrastructure that handle hazardous.

  Find a sample phishing email

Use Google to find a sample phishing email which there are many of on the Internet

  What process you would use test the software security

Evaluate the extent to which programmers have the requisite experience to test the security of software within the development of a product. If not, explain what process you would use test the software security.

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Automated digital job application system

List down advantages that come about having an automated digital job application system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd