The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Suppose we want to transmit data that describes the details of a wire transfer. To do so, we use a public file format with
adequately sized fixed-length fields that specify the transaction details (account numbers involved, names of sender and
recipient, purpose of the transaction, amount to be transferred, time and date, a sequence number for the transaction). To
protect the data during transmission we encrypt it by means of a stream cipher: We produce a secret pseudo-random sequence
that is XORed bit-by-bit with the plaintext data specifying the wire transfer.
Why is this cryptographic protection inadequate, even if the stream cipher is accepted as being strong?
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll